Shaarli export of all bookmarks on Wed, 13 Jun 18 08:34:21 -0400
- Microsoft May 2018 Security Update CredSSP Issue
- ADB Exploit Leaves Thousands Of Android Devices Exposed To Attackers
- Microsoft and friends need to explain why always-connected PCs make sense
- ACPC
- Restaurant Style Pasta with Three Cheese Sauce Recipe -- Easy, Gluten Free, and Delicious | Penniless Parenting
- The four-percent rule for safe withdrawals during retirement
- 7 Tips for Issuing an Effective Press Release
- Windows Server 2019 What's New - Insider Preview Build 17666 | ESX Virtualization
- Want Your Child To Eat (Almost) Everything? There Is A Way : The Salt : NPR
- Using KSQL, Apache Kafka, a Raspberry Pi and a software defined radio to find the plane that wakes…
- XenServer PowerShell – New Windows VM from ISO | Ask the Architect
- Why You Should Use Windows Subsystem for Linux -- Virtualization Review
- Hacking When It Counts: The Magnetron Goes to War | Hackaday
- Understanding Cosmos DB | James Serra's Blog
- Bacula enterprise backup: Review - ITSMDaily.com
- A Better Way to Hire & Scale Your Team
- AMA: Do You Worry About Your Career? | Don Jones
- A third of IT professionals don't know how many endpoints they manage
- 71 percent of IT pros believe they can hack any organization
- DevOps Balanced Scorecard Dashboard | The IT Skeptic
- Top Five Ways to Optimize Performance Monitoring (by Keith Bromley)
- Is your network provider peered with Microsoft? - Tom Talks
- Office 365 Connectivity Guidance – On The Wire
- Gartner: Digital Workers Think Management is Out of Touch with Technology | APMdigest - Application Performance Management
- Cisco Stacking 2960-X Catalyst Switches | PeteNetLive
- The Future Isn’t In Databases, But In the Data - Thomas LaRock
- Advanced Standalone Kubelet tutorial for Raspberry Pi - Povilas Versockas
- How to find the Windows Experience Index in Windows 10 with Powershell – jasoncoltrin.com
- Deployment Research > Research
- ZPAQ
- GDPR: Continental bans WhatsApp & Snapchat | Born's Tech and Windows World
- In Memory Performance, Hyperconverged Simplicity – SAP HANA Validated on Nutanix AHV | Long White Virtual Clouds
- Chris's Wiki :: blog/unix/SbrkVersusMmap
- Lynis – Automated Security Auditing tool for Linux Servers
- Quick tip: Testing volume licensing activation by a KMS | >_
- A Quadruple-Provider Vagrant Environment - Scott's Weblog - The weblog of an IT pro focusing on cloud computing, Kubernetes, Linux, containers, and networking
- Need Help with Oracle Security GDPR Training and Services
- Massive Delete | Oracle Scratchpad
- Exploring Kubernetes with Kubeadm, Part 1: Introduction - Scott's Weblog - The weblog of an IT pro focusing on cloud computing, Kubernetes, Linux, containers, and networking
- Half-baked ideas: Server remote management with an RPi Zero | Richard WM Jones
- Slow network throughput between Ubiquiti EdgeRouter VLANs - IVOBEERENS.nl
- CCNA Training » CCNAv3 – New Questions Part 2
- RedEye Ransomware Destroys Your PC Files If Payment Isn't Made
- Azure Kubernetes Hackfest - Day 1 - Eric’s Azure Blog
- HDD and SSD Maintenance Checklist
- ESXi boot fatal error 33 inconsistent data | Adventures in a Virtual World
- Explaining your "Why" | Opensource.com
- Why You Need To Understand Your Software Supply Chain
- Read Ebooks Quicker With This Spritz-Like Fast Reading Command Line Software - Linux Uprising Blog
- How this media company became the first to broadcast entirely on Linux | Opensource.com
- Five Free Open Source Testing Tools You Can Trust | Information Security Buzz
- Standup report: June 8th, 2018 | Will's blog
- Homemade Cashew Based Hummus Recipe --- Paleo, Vegan, and Easy | Penniless Parenting
- Hummus Recipe
- Volume Shadow Copy Service: Overview and Troubleshooting
- SAP on AWS – Past, Present, and Future | AWS News Blog
- Amazon EKS – Now Generally Available | AWS News Blog
- FCC shrugs at fake cell towers around the White House
- Using MQTT to send and receive data for your next project | Opensource.com
- Citellus: Validate your deployments
- Creating a Wildfly cluster for load-balancing in Linux - LinuxTechLab
- How to Monitor Apache Performance using Netdata on CentOS 7
- Atlanta ransomware attack may cost another $9.5 million to fix
- Censorship in the Age of Large Cloud Providers - Lawfare
- How Apple Programmer Sal Soghoian Got Apps Talking to Each Other | WIRED
- How to Build an Amazon Echo with Raspberry Pi - Make Tech Easier
- Open Source Kata Project Improves Security With Virtualized Containers
- Data Privacy: Why It Matters and How to Protect Yourself | Linux Journal
- An Inside Look at OpenStack Security Efforts
- procinfo - Shows System Statistics from /proc Filesystem
- A Starter Collection of Blockchain Explainers | DennisKennedy.Blog
- The Fifth Anniversary of the Snowden Disclosures - Lawfare
- Make a $6 Tiny Portable Weather Station that Transmits Live Data Wherever You Are
- 18650 control boards
- How to dismantle a compiler bomb | Code Explainer
- The Importance of Using SIEM for GDPR Compliance - Security Boulevard
- CISSP Official Study Guide 8th Edition - What's new
- Think You’ve Got Your Credit Freezes Covered? Think Again. — Krebs on Security
- NCTUE
- Rethinking the “Lessons” of the First World War - Lawfare
- Working with Ansible and AWS EC2, SG, ASG and ELB tags - Alex Scoble's IT Notes - An Information Technology Blog
- NPM Fails Worldwide With "ERR! 418 I'm a Teapot" Error
- Announcing Federal Security and Compliance Controls for Docker Datacenter - Docker Blog
- You receive a "logon failure: unknown user name or bad" error message while accessing remote security-enhanced resources from an ASP.NET application
- TigerText now TigerConnect | Clinical Communication Solutions
- Products · NRS Systems
- Binmap: a system scanner
- How to: Login to your Microsoft Azure Subscription using Powershell «
- How big is the Microsoft Azure Cloud? «
- List all VM sizes in Microsoft Azure per Location «
- 3 Tools for Automating Deployments in the Era of the Modern Hybrid Cloud «
- VulnDB
- Why there are at least 6,000 vulnerabilities without CVE IDs | Synopsys
- Script to Reset WSUS for SysPrep’ed Image – Random Musings of Jeremy Jameson
- Adamj Clean-WSUS Powershell Script : sysadmin
- Clean Up WSUS the Easy Way - Step by Step
- Script Reset WSUS Authorization and get new WSUS SID
- Script Reset Windows Update Agent
- GitHub - strongdm/comply: Compliance automation framework, focused on SOC2
- The State of ICS: One Year Into the Cyber Executive Order
- Security: Getting Off the Patch - The Shining Hope - Security Boulevard
- SecMon State of the Union: Refreshing Requirements - Security Boulevard
- Security: Getting Off the Patch - The Shining Hope
- Crashing HDDs by launching an attack with sonic and ultrasonic signalsSecurity Affairs
- The Ultimate Guide to CompTIA’s Security+ Certification - Security Boulevard
- The Security+ CBK Domains: Information And Updates - Security Boulevard
- GDPR Is Affecting the Way WHOIS Works, Security Researchers Worry
- What GDPR Compliance means to the IT Security Professional - Security Boulevard
- 50 Essential Cloud Security Blogs for IT Professionals and Cloud Enthusiasts – Threat Stack
- Home
- Developing GDPR compliant applications, Part 3: Minimizing application privacy risk
- Developing GDPR compliant applications, Part 2: Application privacy by design
- Developing GDPR compliant applications, Part 1: A developer’s guide to the GDPR
- Manage your fleet’s firewalls with osquery | Trail of Bits Blog
- Back to basics: What sysadmins must know about logging and monitoring | HPE
- The crooked timber of humanity | 1843
- Resetting Your Router the Paranoid (=Right) Way - Resetting Your Router the Paranoid (=Right) Way
- Binary analysis with Radare2 - Binary analysis with Radare2
- Radare2
- Attackintel - Tool To Query The MITRE ATT&CK API For Tactics, Techniques, Mitigations, & Detection Methods For Specific Threat Groups - KitPloit - PenTest Tools for your Security Arsenal ☣
- Prowler - Distributed Network Vulnerability Scanner - KitPloit - PenTest Tools for your Security Arsenal ☣
- ReverseAPK - Quickly Analyze And Reverse Engineer Android Packages - KitPloit - PenTest Tools for your Security Arsenal ☣
- GitHub - trimstray/otseca: Open source security auditing tool to search and dump system configuration. It allows you to generate reports in HTML or RAW-HTML formats.
- What goes in an incident response plan? – IT Governance Blog
- 5 tips to thwart medical device attacks | CSO Online
- Evil Tester: Google Advanced Searches - Google Dorks
- How to implement an ISMS aligned with ISO 27001 – IT Governance Blog
- PCI DSS compliance made easier – IT Governance Blog
- How to Prevent Cloud Configuration Errors
- Sysadmin Stories: PowerCLI - Get the sizing of virtual machines
- I/O Analyzer
- 13 tools for checking the security risk of open-source dependencies
- Librarians, Meet Your Motherboard » Public Libraries Online
- Ready, Set, Negotiate! Preparing for Successful Contract Talks » Public Libraries Online
- Observation, Orientation, Decision, Action Applying the OODA Loop Concept to Libraries » Public Libraries Online
- Teaching Technology » Public Libraries Online
- Windows Server 2012 R2 – Uninstalling .Net Framework 4.6, 4.6.1, 4.6.2, 4.7, 4.71 – the Connector Space
- Using the server_stats command on Celerra / VNX File - THE SAN GUY
- Gathering performance data on a virtual windows server - THE SAN GUY
- Scripting automatic reports for Isilon from the CLI - THE SAN GUY
- Meet Aptomi: An application delivery engine for Kubernetes - Superuser
- Isilon Port Usage - THE SAN GUY
- Default Passwords - THE SAN GUY
- Minikube: Try Kubernetes on Windows without headaches – Marksei
- Spanning The Tree : Dr Radia Perlman & Untangling Networks | Hackaday
- ESXi CLIativity – Part 1 | Adventures in a Virtual World
- An inside look at Google’s hiring and onboarding processes
- How to Configure ESXi Unattended Installations: Part 1
- Counting Bees With A Raspberry Pi | Hackaday
- Red Hat's only business plan is to keep changing plans | ZDNet
- Effects of Bring Your Own Device (BYOD) On Cyber Security
- Amazon Web Services Networking Overview « ipSpace.net by @ioshints
- dbKoda | dbKoda is the open-source, next generation IDE for MongoDB. Take your database to the next level with our Rich Code Editor, Multiple Connection Management and Topology Tree Explorer.
- Systematic MongoDB performance tuning – dbKoda – Medium
- Introducing SQL Server on Kubernetes - Blog dbi services
- Semi-Automatic LaTeX: KDE’s Kile | OCS-Mag
- OpenStack Summit Vancouver: Automating the data centre | Ubuntu blog
- Kubernetes recipes: Maintenance and troubleshooting - O'Reilly Media
- BPFILTER Landing For Linux 4.18 For Eventually Better Firewall / Packet Filtering - Phoronix
- Paleo Vegan Tzatziki Recipe -- Mediterranean Yogurt Cucumber Sauce | Penniless Parenting
- What is zchunk?
- How to Monitor Your Linux Servers Performance with Glances Tool
- Red Hat Summit: Building production-ready containers - RHD Blog
- 10 7zip (File Archive) Command Examples in Linux
- Notes On Installing CentOS 7 Server – levlaz
- Hewlett Packard Enterprise Grows Compute Business as Private Cloud Opportunities Advance
- Microsoft OneDrive for Business Review: Pros and Cons
- Building an 90° angular power adapter for the C64 | 0xf8.org
- "How much house can I afford?"
- Top 5 Consumer Tips for Your Credit Report - Law and Daily Life
- Can an Employer Check Your Credit Score? - Law and Daily Life
- Nutanix Resiliency – Part 2 – Converting from RF2 to RF3 | CloudXC
- Nutanix Resiliency – Part 1 – Node failure rebuild performance | CloudXC
- Block Ads & Malvertising on pfSense Using pfBlockerNG (DNSBL) - Linux Included
- DNS is Changing. Are you Ready? - DNS is Changing. Are you Ready?
- Giving a Presentation? How to Impress Your C-Level Audience
- Diskover - File System Crawler, Storage Search Engine And Analytics Powered By Elasticsearch - KitPloit - PenTest Tools for your Security Arsenal ☣
- How InfoSec Institute Alum Rexson Serrao Earned the World’s Highest CGEIT Score
- List of data breaches and cyber attacks in May 2018 – 17,273,571 records leaked – IT Governance Blog
- Ten Best Practices for Outsmarting Ransomware
- Sia Load Test Wrap-up | Space Duck
- Abusing IVR Systems - Legacy Telecom [CVE-2018-11518]Security Affairs
- Fortinet Threat Report Reveals an Evolution of Malware to Exploit Cryptocurrencies
- “Free” Memory Sticks can be Expensive
- Troy Hunt: Pwned Passwords in Practice: Real World Examples of Blocking the Worst Passwords
- USING POWERSHELL TO BACKUP SQLSERVER DATABASES
- Don’t Be GDPR Complacent, It’s Time to Get Compliant - Security Boulevard
- Does your organisation rely too heavily on technology? – IT Governance Blog
- What does a ransomware attack cost? Beware the hidden expenses | CSO Online
- A Gorgeous Guide to the First Wave of Personal Computers - Motherboard
- Collect NTFS forensic information with osquery - Security Boulevard
- Pathways to an Enterprise Security Architecture (ESA) | Security Architects Partners
- NBlog - the NoticeBored blog: NBlog May 11 - mind remapped
- NBlog - the NoticeBored blog: NBlog May 19 - PRAGMATIC security metrics
- NBlog - the NoticeBored blog: NBlog May 25 - GDPR day
- Back to Basics: Focus on the First Six CIS Critical Security Controls - basics-focus-first-cis-critical-security-controls-38395
- 10 Endpoint Security Problems Solved by the Cloud - 10-endpoint-security-problems-solved-cloud-38415
- The Untold Story of Japan’s Secret Spy Agency
- Completing the vSphere vCenter Appliance Hardening Process | slice2
- HOWTO quickly STIG Firefox 59.01 | slice2
- ESXi Compatibility Checker
- GDPR Hall of Shame
- Cybersecurity salaries highest in retail sector
- Securing the modern workplace with Microsoft 365 threat protection – part 4 – Microsoft Secure
- Securing the modern workplace with Microsoft 365 threat protection – part 3 – Microsoft Secure
- Securing the modern workplace with Microsoft 365 threat protection – part 2 – Microsoft Secure
- Securing the modern workplace with Microsoft 365 threat protection – part 1 – Microsoft Secure
- DHS Cybersecurity Strategy | Homeland Security
- Cyberattack map shows impacted U.S. school districts
- Fiber Cable | Nbctcp's Weblog
- Metta - An Information Security Preparedness Tool To Do Adversarial Simulation - KitPloit - PenTest Tools for your Security Arsenal ☣
- [LFCS] Commands to manage and configure containers in Linux – //Cloud notes from my desk
- Honeybits - A Simple Tool Designed To Enhance The Effectiveness Of Your Traps By Spreading Breadcrumbs & Honeytokens Across Your Systems - KitPloit - PenTest Tools for your Security Arsenal ☣
- FreeRADIUS Server Configuration Tool - KitPloit - PenTest Tools for your Security Arsenal ☣
- Samurai Email Discovery - Is A Email Discovery Framework That Grabs Emails Via Google Dork, Company Name, Or Domain Name - KitPloit - PenTest Tools for your Security Arsenal ☣
- Sandmap - A Tool Supporting Network And System Reconnaissance Using The Massive Nmap Engine - KitPloit - PenTest Tools for your Security Arsenal ☣
- Open Source Security Podcast
- Dumpzilla - Extract All Forensic Interesting Information Of Firefox, Iceweasel And Seamonkey Browsers - KitPloit - PenTest Tools for your Security Arsenal ☣
- Security and Human Behavior (SHB 2018) - Schneier on Security
- USB Reverse Engineering: Down the rabbit hole | /dev/alias – Hack. Dev. Transcend.
- GDPR compliance checklist for healthcare – IT Governance Blog
- Business Continuity Awareness Week (BCAW) – Free BCM resources – IT Governance Blog
- Galileo - Web Application Audit Framework - KitPloit - PenTest Tools for your Security Arsenal ☣
- Archerysec - Open Source Vulnerability Assessment And Management Helps Developers And Pentesters To Perform Scans And Manage Vulnerabilities - KitPloit - PenTest Tools for your Security Arsenal ☣
- Salt-Scanner - Linux Vulnerability Scanner Based On Salt Open And Vulners Audit API - KitPloit - PenTest Tools for your Security Arsenal ☣
- Burpa - A Burp Suite Automation Tool - KitPloit - PenTest Tools for your Security Arsenal ☣
- Where does data flow mapping fit into your GDPR compliance project? – IT Governance Blog
- Two Ways To Be A Parent: Insights From The Author Of 'The Gardener And The Carpenter' : Goats and Soda : NPR
- Magic Mirror Tirelessly Indulges Children’s Curiousity | Hackaday
- Cyber security incidents are becoming more common and harder to resolve – IT Governance Blog
- CISO MindMap 2018 – What Do InfoSec Professionals Really Do?Rafeeq Rehman – Personal Blog
- Vulnerability Management: So Much More Than Just Patch Management
- Deployment Research > Research
- From Cambridge Analytica to GDPR: Enter digital supply chain management
- HITRUST Unveils Certification for NIST Cybersecurity Framework
- HITRUST releases NIST Cybersecurity Framework certification program
- Ask the DPO Web Conference Series
- The AWS Bucket List for Security
- SOC Automation: Good or Evil?
- The 13 Step Guide to Secure Your PC After a Fresh Windows Installation [Updated]
- Linux Privilege Escalation using Sudo Rights
- Healthcare Exchange Standards: Erasure Receipt
- Healthcare Exchange Standards: GDPR on FHIR
- Smashing Silos and Building Bridges in the ...
- US Government Cybersecurity at a Crossroads
- Hacking Articles - Raj Chandel's Blog
- The Modern Day Hacker – A Cautionary Tale - The Ethical Hacker Network
- 7 Tools for Stronger IoT Security, Visibility
- Get Ready for 'WannaCry 2.0'
- What Israel's Elite Defense Force Unit 8200 Can ...
- GDPR 101: Keeping Data Safe Throughout the 'Supply ...
- A Data Protection Officer's Guide to the Post-GDPR ...
- GDPR, WHOIS & the Impact on Merchant Risk Security ...
- Clint Boessen's Blog: 432 4.3.2 STOREDRV.Deliver recipient thread limit exceeded
- Pi serial adaptor | Facelesstech
- Harrowing Story of Installing Libreboot on ThinkPad | Hackaday
- Atari co-founder Ted Dabney dies
- List of Shark Tank Contestants
- 11 ways to hack 2FA | CSO Online
- Security Report Analysis: 2018 DBIR Report - Daniel Miessler
- What SSH Hacking Attempts Look Like – Doug Rickert – Medium
- Best certifications to get - The Silicon Underground
- LOADays
- OWASP DefectDojo Project - OWASP
- Linked - IBM bans all removable storage, for all staff, everywhere
- GDPR : The good, the good and the good! | The ORACLE-BASE Blog
- Computer security principles » Gofore
- Brendan Tierney - Oralytics Blog: Creating a Word Cloud using Python
- GitHub - rShetty/awesome-podcasts: Collection of awesome podcasts
- Decoding and Listening to HD Radio (NRSC-5) with an RTL-SDR - rtl-sdr.com
- YouTube Talk: Investigating RF Controls with RTL-SDR - rtl-sdr.com
- Naturebytes' weatherproof Pi and camera case - Raspberry Pi
- Continued: the answers to your questions for Eben Upton - Raspberry Pi
- PR-Holonet: Disaster Area Emergency Comms | Hackaday.io
- PR-Holonet
- Strengthening cybersecurity for the DoD – accelerating compliance – Azure Government Cloud
- Hey DBAs! Powershell is your friend! – Stefano Altamura’s Blog
- Windows Server Performance Tuning Guidelines – Brad Chen's SQL Server Blog
- Why GDPR is a $3.5 billion business opportunity – Microsoft Partner Network Blog
- How to set up a Virtualization Host using KVM on Ubuntu – Marksei
- How to Make Windows Speak the Time Out Loud Every Hour
- 5 Ways to Generate a List of All Installed Programs in Windows
- Windows Keyboard Shortcuts 101: The Ultimate Guide
- How to Keep Ethernet, TV, and Power Wires Tidy Using Cable Covers
- Making Sense of USB-C and Thunderbolt Cables and Ports on Your MacBook
- 10 Essential Vivaldi Browser Tips & Tricks for Speed and Productivity
- The Internet of (Medical) Things: Dangers, Risks, and Security Problems
- Why You Should Be Concerned About the EU's New CPC Law
- DNS Propagation Checker - ViewDNS.info
- Why modernize your datacenter if you are cloud first? | Virtual Me
- Passing the AWS Certified Developer – Associate Exam #AWS @acloudguru @AWS @AWS_UKI #vExpert @PSIServicesLLC – vMusketeers
- Everything You Need to Know About Raspberry Pi GPIO Pins
- The scientific methodology for troubleshooting SharePoint | SharePoint Dragons
- Auto-generated infrastructure node graphs from Terraform plans - Skelton Thatcher
- A Better Way of Visualizing Microservice Architecture
- A free e-learning tool for creating digital content | Opensource.com
- Chris's Wiki :: blog/linux/ReplacingNetstatNotBad
- 15 books for kids who (you want to) love Linux and open source | Opensource.com
- FOSS as a Part of a Corporate Sustainability Plan | Linux Journal
- Zammad - An Open Source Help Desk and Support Ticket System
- 8 Policy Changes to Improve Your Business’s Security
- GDPR Derogations, ePrivacy, and the Evolving European Privacy Landscape - Lawfare
- Sorting Through GDPR: What to Watch After May 25 - Lawfare
- BBC - Culture - The 100 stories that shaped the world
- Speculative Store Bypass: spectre for browsers, the nightmare isn't over yet – Marksei
- Is Training The Enemy of Progress? | The Networking Nerd
- Culture Shifts and Work Travel Learnings · Lindsay Hill
- Router on a Stick: Intro & Configuration (with lab files) - RouterFreak
- Rethinking motivation and engagement in the open organization | Opensource.com
- Journal of Azuma Hazuki (5086)
- Adding Value to Risk Management Activities With Open Source Tools
- Digitizing my DVDs
- DOTmed.com - Boston Children's Hospital quickens medical image processing in RedHat and MOC collab
- Which Programming Languages Use the Least Electricity? - The New Stack
- Debian-goodies - A Set Of Useful Utilities For Debian And Ubuntu Users - OSTechNix
- GitHub - tryolabs/luminoth: Deep Learning toolkit for Computer Vision
- An FUQ for the GDPR | Linux Journal
- How to Run Your Own Git Server | Linux.com | The source for Linux information
- How to Install TeamSpeak Server in CentOS 7
- Circuit VR: Sink or Swim with Current Sources | Hackaday
- Ask Hackaday: Whatever Happened to Wire Wrapping? | Hackaday
- Printed Circuits In The Palm Of Your Hand | Hackaday
- Printed It: Toolbag Essentials | Hackaday
- Harmony Hub Hacked and Patched | Hackaday
- Rooting a Logitech Harmony Hub: Improving Security in Today's IoT World « Rooting a Logitech Harmony Hub: Improving Security in Today's IoT World | FireEye Inc
- HFT On HF, You Can’t Beat It For Latency | Hackaday
- 3D Printing Air Quality Study | Hackaday
- Getting ready for GDPR with Office 365
- 7 ways we have improved our core code base
- 100 percent of organizations have active insider threats
- The Electrical Outlet and How It Got That Way | Hackaday
- Poor mans Bash Bunny – Cron Blog – My personal findings
- Richard Feynman: A Life Of Curiosity And Science | Hackaday
- How Hertha Ayrton Enabled the Titanic to Call SOS | Hackaday
- Hertha Ayrton
- Cloud computing may finally end the productivity paradox
- Half of employees not aware of their company's GDPR preparations
- Microsoft will roll out 'key' GDPR rights globally... not just in Europe
- Chris's Wiki :: blog/tech/DangerousRegistration
- Windows Server Status Monitor (Update Version 1.4) – Stick To The Script
- Economist Bryan Caplan thinks education is mostly pointless showing off. We test the strength of his case. - 80,000 Hours
- UK Decision Makers Unsatisfied with IT Vendor Service | APMdigest - Application Performance Management
- How to stay on top of home improvement ~ Get Rich Slowly
- Pure//Accelerate 2018 – Thursday General Session – Rough Notes | penguinpunk.net
- Sandpits in enterprise data protection » NetWorker Information Hub
- Just one more esxi-guy: vSAN Cluster via PowerCli
- How-To Create a Training Class Through Ravello Training Platform | ESX Virtualization
- pasta salad with roasted carrots and sunflower seed dressing – smitten kitchen
- Slacking Away on vSAN — ThinkCharles.net
- AsteroidOS and OpenWatch Aim to Open Up Smartwatch Market | Linux.com | The source for Linux information
- OpenWatch
- Using Stratis to manage Linux storage from the command line | Opensource.com
- Zuul - A Project Gating System — Zuul documentation
- dbachecks – Save the results to a database for historical reporting | SQL DBA with A Beard
- HP 3PAR CLI Reference Guide - THE SAN GUY
- Multi-tier load-balancing with Linux | Vincent Bernat
- AppDynamics for SAP Released | APMdigest - Application Performance Management
- Windows 10: End of Life for several builds | Born's Tech and Windows World
- How cool is this: EMC’s Recoverpoint goes INSIDE vSphere!
- The Complex Taxation of America’s Retirement Accounts - Tax Foundation
- A newbies guide to ELK - Part 4 - Filtering w/ Grok - mwpreston.net
- Engage 2018, some HUGE announcements and the OGS Replay
- Chris's Wiki :: blog/tech/NoPersonalInfrastructure
- Stop wasting time developing SharePoint Training Manuals - SharePoint Maven
- Suing to Get a 30-Yr-Old Child Out of Your House - Law and Daily Life
- Spotify's GDPR updates add privacy and data download tools
- 'Japan Sales Mastery:' Lessons from 30 years in Japan - Japan Today
- After Meltdown and Spectre, Another Scary Chip Flaw Emerges | WIRED
- VeeamON 2018 Recap | TinkerTry IT @ Home
- Motivation: Take Advantage Of Being 29, 39, 49, or 59 Years Old — My Money Blog
- Windows 10 Upgrade/Servicing tools demoed at MMS 2018 – CCMEXEC.COM – Enterprise Mobility
- I am Disappointed in Frontier Communications - Patshead.com Blog
- Google and Microsoft unveil Spectre V4 CPU vulnerability | Born's Tech and Windows World
- 7 Places to Find Free or Cheap Groceries
- How to Write a Great Resume as a Business Professional
- Intel details fourth Spectre-style CPU security flaw
- 6 Key Pointers for Running Your Virtual Machine Safely
- Training Programs: The Secret to Business Success
- Chris's Wiki :: blog/tech/NFSMyMetricsSplit
- Analyzing Large Capture Files Part 2 – Protocol Hierarchy – Chris Sanders
- PeteNetLive - KB0000515 - VMware - Cannot Cut, Copy, or Paste to and from VM's | PeteNetLive
- Windows: Finding Stale User and Computer Accounts | PeteNetLive
- Visibility is Security | APMdigest - Application Performance Management
- What are Thresholds for Good and Poor Network Packet Loss, Jitter and Round Trip Time for Unified Communications? - Tom Talks
- Use Powershell to Get a List of Users with Out of Office enabled in Outlook Office365 – jasoncoltrin.com
- Windows Download - #1 Windows ISO Download Source
- Generating Good Passwords, Part I | Linux Journal
- States and Their Proxies in Cyber Operations - Lawfare
- Weekend Reading: Backups | Linux Journal
- Speeding Up Netfilter (by Avoiding Netfilter) | Linux Journal
- Security and privacy reminder: Spring clean your systems | Opensource.com
- ‘Crush Them’: An Oral History of the Lawsuit That Upended Silicon Valley - The Ringer
- You-Get - A CLI Downloader To Download Media From 80+ Websites
- After Four Years, AsteroidOS Open-Source Smartwatch OS Is Ready for the Masses
- AsteroidOS
- Red Hat Virtualization 4.2 Adds New High-Performance, SDN Features
- Fixing Disk Signature Collisions – Mark's Blog
- Schedule Task Monitor Script
- Why You Need Cloud Data Backup: Cloud Storage Weaknesses Explained
- IoT for Managed Service Providers: Challenge or Opportunity?
- DSHR's Blog: Prof. James Morris: "One Last Lecture"
- Amazon.com: Charles Platt: Books
- DeployHappiness | The One and a Half Year Bachelor’s Degree for Less Than Free
- 19 Things You Should Make Your Kids Pay For
- Here Are 11 Reasons We Have An Umbrella Liability Insurance Policy — My Money Blog
- Hierarchy of Financial Needs (and the Meaning of Life) | Mad Fientist
- Philippines to integrate open-source electronic medical record platform for enhanced health programs | OpenGovAsia
- Healthcare Open Source Projects Speed Up Technology Adoption
- What Is EVPN? « ipSpace.net by @ioshints
- Kickstart Scripted VMware ESXi Install to USB Media – Michelle Laverick…
- Configuration vulnerability could leave SAP systems open to compromise
- If Facebook had been GDPR compliant would things have been different?
- 73 percent of industrial networks are vulnerable to hackers
- The rise of the experimentation team
- How managed services can help businesses with GDPR [Q&A]
- Younger generations lack understanding of cybersecurity careers
- 18 useful financial rules of thumb ~ Get Rich Slowly
- How the Father of Computer Science Decoded Nature’s Mysterious Patterns - The New York Times
- Ευάγγελος Μπαλάσκας - USBGuard » Evaggelos Balaskas - System Engineer
- Terratest - an Open Source Go Library for Automated Infrastructure Testing
- Perfect Gluten Free Vanilla Cake Recipe -- Allergy Friendly, Dairy Free, Vegan Option | Penniless Parenting
- Ring doorbell flaw lets others watch after password changes (updated)
- Securosis - Blog - Article
- Introducing vSphere 6.7 Security - VMware vSphere Blog
- Cyber Exposure Meets Political Practicality - Blog | Tenable™
- How to Secure and Audit an Amazon Web Services Three-tier Web Architecture - Blog | Tenable™
- Critical Oracle WebLogic Server Flaw Still Not Patched - Blog | Tenable™
- Virtual Instruments Releases VirtualWisdom 5.6 | APMdigest - Application Performance Management
- VirtualWisdom
- Skype for Business to Microsoft Teams Roadmap Update April 23, 2018, 9 Changes - Tom Talks
- The Office 365 train is still steaming along with more than 135 million monthly active users, Microsoft FY18 Q3 Results - Tom Talks
- Labeling endpoint actions with Logstash - Threat Hunting - Syspanda
- Zero Day Initiative — The May 2018 Security Update Review
- What does a CISO actually do? | Thom Langford
- State Machine Testing with Echidna | Trail of Bits Blog
- Windows Incident Response: EDR Obviates Compliance
- Barebone Kickstart setup for CentOS 7 | Velenux Home Page
- IT Monitoring Changing in 2018 | APMdigest - Application Performance Management
- Catchpoint Releases Free Benchmarking Service | APMdigest - Application Performance Management
- The STEM Pipeline: What Can You Do? | Webroot
- Importing McAfee ePO Threat events to ELK - Syspanda
- Monitoring Active Directory with ELK - Syspanda
- VMware PowerCLI - Create Port Groups Script
- VMware PowerCLI - Copy Port Groups Script
- How to thrive at a technical conference - major.io
- The Advent of the Fourth Wave of Computing - Netronome
- Why Bare Metal Does Not Have To Be Nude - Netronome
- The Case for Express Virtio (XVIO) – Part 2 - Netronome
- The Case for Express Virtio (XVIO) – Part 1 - Netronome
- Zero-Trust Security for Cloud Data Centers – How Much Does it Cost? - Netronome
- Samba login using windows AD on Centos 7 | SvennD
- An Updated Look at My Multi-Platform Toolbelt - Scott's Weblog - The weblog of an IT pro specializing in cloud computing, open source, networking, and virtualization
- Our preparations for Europe’s new data protection law
- Data Collection: How To Gather Meaningful Data - Thomas LaRock
- Don't run away from The System, learn to bend it to your advantage - The Matrix has you...
- NIST Updates Risk Management Framework to Incorporate Privacy Considerations | NIST
- First EU cybersecurity law takes effect—with new fines for misbehaving companies – EURACTIV.com
- Is the Irish DPC fit for purpose?
- Building A Windows 10 1803 (April 2018 Update) Reference Image with MDT – Stick To The Script
- Free stock photos · Pexels
- Google outlines GDPR-compliance efforts
- Calculating Cloud Cost: 8 Factors to Watch
- 20 Signs You Are Heading for a Retention Problem
- Why GDPR is Every Security Professional’s Dream - Delta Risk
- Failure without Consequences after Breach - The Ethical Hacker Network
- How to Avoid Bad Clients: 12 Red Flags I Look for to Dodge Nightmare Projects
- Google Online Security Blog: Google CTF 2018 is here
- 'All of Us' Research Project: The Privacy Risks
- Is Converging Your IT and OT Networks Putting Your Organization at Risk? | CSO Online
- Zero Trust: Why ‘cyber insurance’ offers no GDPR compliance | CSO Online
- The rise of the NIST cybersecurity framework | CSO Online
- PowerShell mouse jiggler | Logan Marchione
- Install Python On Windows With A One-Liner - krypted.com
- LasLabs Blog | Storing SSH keys in Active Directory for easy deployment - LasLabs Blog
- LasLabs Blog | Managing SSH Keys Stored in Active Directory - LasLabs Blog
- The Idiot uses Grafana and Influxdb to monitor Proxmox – Jon Spraggins
- Resolved: "Permission denied (publickey)." when trying to access via ssh an Ubuntu Server - Knowledge eXchange
- How to store your ssh public key in a different directory - Knowledge eXchange
- Deployment Research > Research
- Find the repository of all installed packages on Debian or Ubuntu | /contrib/famzah
- Time To Get Back To Basics? | The Networking Nerd
- Packets over a LAN are all it takes to trigger serious Rowhammer bit flips | Ars Technica
- Quick tip: What new products and classifications have been added in the past 30 days to WSUS? | >_
- Doc Searls Weblog · GDPR will pop the adtech bubble
- Career Certification Strategy – vcdx133.com
- vRA Design Considerations – vcdx133.com
- VCDX – Exam Techniques – vcdx133.com
- Deploying vSphere Virtual Machines using Ansible
- vSphere Design Considerations – vcdx133.com
- VSAN Maintenance Mode with PowersHell – Michelle Laverick…
- MSP Backup Pricing Guide: Tips and Strategies
- Red Hat Certification Guide: Overview and Career Paths
- 5 Awesome Open Source Cloning Software - nixCraft
- Spectre, Meltdown made industry collaborate: Red Hat - Security - CRN Australia
- A look at open source image recognition technology | Opensource.com
- Terraform by HashiCorp
- Maximizing Value from Open Source Testing Frameworks - The New Stack
- GitHub - axsh/openvdc: Extendable Tiny Datacenter Hypervisor on top of Mesos architecture. Wakame-vdc v2 Project.
- OpenVNet
- Axsh | Cloud Technology and Network Virtualization
- 18 Tips & Tricks To Speed Up Windows 10 And Make It Faster
- Everything You Need to Know about the Cloud and Cloud Computing, Part I | Linux Journal
- How Misinformation Spreads on Social Media—And What To Do About It - Lawfare
- Keynote: Crossing the River by Feeling the Stones - Simon Wardley - vNinja.net
- VCDX – Throwing Bones – vcdx133.com
- VCDX Journey – Part 3 – Design Scenario – vMusketeers
- VCDX Journey – Part 2 – Where I Messed It Up – vMusketeers
- VCDX Journey – Part 1 – Lessons Learned – vMusketeers
- My VCAP-DCV 6.5 exam experience – VCDX6 in the pocket | viktorious.nl – Virtualization & Cloud Management
- Performance Checklist now available for vSAN benchmarking - CormacHogan.com
- Automate Performance Monitor Statistics Collection for SQL Server and Windows
- Finding ESXi iLO/iDrac Information with PowerCLI
- Making a little nest for your VMs – Michelle Laverick…
- Upgrade Raspbian Jessie to RaspbianStretch | Marco Franssen
- 10 “Notes to Self” that Will Stop You from Taking Things Personally
- RedHunt OS - Virtual Machine For Adversary Emulation And Threat Hunting - KitPloit - PenTest Tools for your Security Arsenal ☣
- WSSAT v2.0 - Web Service Security Assessment Tool - KitPloit - PenTest Tools for your Security Arsenal ☣
- Astra - Automated Security Testing For REST API's - KitPloit - PenTest Tools for your Security Arsenal ☣
- hBlock - Improve Your Security And Privacy By Blocking Ads, Tracking And Malware Domains - KitPloit - PenTest Tools for your Security Arsenal ☣
- Zoom - Automatic & Lightning Fast Wordpress Vulnerability Scanner - KitPloit - PenTest Tools for your Security Arsenal ☣
- AutoTTP - Automated Tactics Techniques & Procedures - KitPloit - PenTest Tools for your Security Arsenal ☣
- New certificate in cybersecurity and data privacy law responds to student demand
- 1.13M Records Exposed by 110 Healthcare Data Breaches in Q1 2018
- How to conduct an ISO 22301-compliant business impact analysis – IT Governance Blog
- New criminal hacking group targets healthcare organisations – IT Governance Blog
- Companies continue to download faulty software exploited in Equifax breach
- GDPR-US-10-things-you-need-to-know-052018_final.pdf
- Securing IoT in Healthcare is Critical | CSO Online
- What is a Chief Security Officer? Understanding this critical role | CSO Online
- Breakout Time: A Critical Key Cyber Metric
- Microsoft's Patch Tuesday Fixes Two CVEs Under ...
- Some ideas about Oracle Database on Docker - Blog dbi services
- Simon Wardley – Strategy by Mapping,Crossing the River by Feeling the Stones — EtherealMind
- Person with diabetes finds open source and builds her own medical device | Opensource.com
- Equifax confirms data breach included driver's licenses and passports
- Security Vendor Sales Pitches and Empty End Point Promises
- Security baseline for Windows 10 “April 2018 Update” (v1803) – FINAL – Microsoft Security Guidance blog
- First things first: Envisioning your security deployment – Microsoft Secure
- The Ransomware Sausage Factory – Do You Really Want To Know How They Got Your Data Back?
- What is tar and why does OpenShift Container Application Platform use it? - Red Hat Customer Portal
- Understanding the Role of Multi-Stage Detection in a Layered Defense
- Different block sizes when you plugin? – Upgrade your Database - NOW!
- How to convert/split p12 certificates into single files – – Unixblogger –
- Security Trade-Offs in the New EU Privacy Law — Krebs on Security
- JPCERT/CC Blog: JPCERT/CC Publishes "Vulnerability Coordination and Disclosure Policy"
- NIS Directive and GDPR double jeopardy: Can you be fined twice for the same breach? – IT Governance Blog
- Software to support your GDPR compliance project – IT Governance Blog
- List of data breaches and cyber attacks in April 2018 – 72,611,721 records leaked – IT Governance Blog
- The GDPR and the right to be forgotten – IT Governance Blog
- The GDPR: Get a crucial cyber security qualification in one day – IT Governance Blog
- Investors must pay closer attention to cyber threats – IT Governance Blog
- Infographic: How to comply with the NIS Directive – IT Governance Blog
- Securing top management’s approval of your BCMS is crucial – IT Governance Blog
- 5 things you need to know about CIR management – IT Governance Blog
- 5 benefits of an ISO 22301-conforming BCMS – IT Governance Blog
- The Scottish Cyber Resilience Strategy for health boards – IT Governance Blog
- Cyber risk and resilience: A guide for the board and senior management – IT Governance Blog
- Cloud service providers and the NIS Directive – are you resilient enough? – IT Governance Blog
- (31) APPSEC Cali 2018 - ReproNow - Save time Reproducing and Triaging Security Bugs - YouTube
- Ray Ozzie’s plan for unlocking encrypted phones gets a chilly reception | Ars Technica
- (31) Track 2 00 Preparing for Incident Handling and Response within Industrial Control Networks Mark Stac - YouTube
- Is Article 27 the GDPR's 'hidden obligation'?
- Massachusetts Senate passes data breach bill regulating consumer reporting agencies
- Store 6000+ Records & Breach Costs Will Exceed Security Investment: Report - Infosecurity Magazine
- What's the future hold for US health care privacy regulation?
- Equifax has spent $242.7 million on its data breach so far | ZDNet
- Companies launch open-source GDPR framework for DSARs
- Recent Ransomware Incidents Serve Up Lessons - HealthcareInfoSecurity
- FDA Unveils Plan for ‘Software as a Medical Device’ Review
- The Best Strategy for Cyber-Conflict May Not Be a Cyber-Strategy
- (31) APPSEC Cali 2018 - Closing Keynote - Digital Disease: How Healthcare Cybersecurity Challenges... - YouTube
- Infosecurity.US - Web Log - QOTD Esther Dyson
- GDPR Is Coming. Is Your Organization Ready?
- PyRoMine Malware Sets Security Industry on Fire
- 5 Top Cybersecurity Themes at RSA 2018 - HealthcareInfoSecurity
- How Triton Malware Targets Industrial Control Systems
- Is Payments Industry Ready for New Encryption Protocols?
- SamSam Ransomware Offers Volume Decryption Discount
- Certain Becton Dickinson Products at Risk for 'KRACK' Flaw
- How Authentication Must Evolve in the Age of GDPR
- Former Physician Convicted of Criminal HIPAA Violation
- The Biggest “Small” Personal Digital Security Mistakes – tisiphone.net
- Texas Hospital CEOs: Cybersecurity Is No. 1 Worry
- Multitouch 'skin' makes your body the controller
- Lesley on Brakeing Down Incident Response Podcast – All About Playbooks – tisiphone.net
- Finally, a free open-source database for all Canadian startup information | Financial Post
- USB Device Tracking using the Partition/Diagnostic Event Log - Digital Forensics Stream
- Every Business Needs a Vulnerability Disclosure Policy. Every. Single. Business. - The Ethical Hacker Network
- Why Am I Getting All These Terms of Service Update Emails? | Electronic Frontier Foundation
- Bring in the Nerds: EFF Introduces Actual Encryption Experts to U.S. Senate Staff | Electronic Frontier Foundation
- Building a freedom-based photography community | Opensource.com
- Spicy Garlicky Stir Fried Eggplant Recipe -- Paleo, Vegan, and Easy | Penniless Parenting
- There is No Middle Ground on Encryption | Electronic Frontier Foundation
- WEBCAST: Web App Assessments for Non-Majors - Black Hills Information Security
- Analyzing Large Capture Files Part 1 – Colorizing Conversations in Wireshark – Chris Sanders
- 'Zero Login:' The Rise of Invisible Identity
- Sarah Squire
- 3 Ways to Maximize Security and Minimize Business ...
- GDPR Requirements Prompt New Approach to Protecting ...
- Ransomware Attacks Jumped 400% Worldwide in 2017
- Automation Exacerbates Cybersecurity Skills Gap
- What Meltdown and Spectre Mean for Mobile Device ...
- Encryption is Necessary, Tools and Tips Make It Easier
- Spectre Returns with 8 New Variants
- 5 Ways to Better Use Data in Security
- Calling all open source advocates: join the GPL Cooperation Commitment
- Going through the 7 stages of GDPR | CSO Online
- Best security software, 2018: How 9 cutting-edge tools tackle threats | CSO Online
- GDPR-defined personal data can be hard to find—here's where to look | CSO Online
- China increases employee surveillance, creating its own Thought Police | CSO Online
- Branding infosec: Why security should consider its own internal advertising campaign | CSO Online
- Can Shadow IT Be Good for Enterprises? | CSO Online
- Updates to Ansible Playbook for Usenet Docker containers | Calvin Bui
- Cybersecurity Tech Accord
- Cyberwar: Silicon Valley’s new bright, shiny thing | CSO Online
- Why securing containers and microservices is a challenge | CSO Online
- Conway's Law: does your organization’s structure make software security even harder? | CSO Online
- What is cyber resilience? Building cybersecurity shock absorbers for the enterprise | CSO Online
- Adopt the NIST cybersecurity framework (CSF) and harness the wisdom of crowds | CSO Online
- Insuring Uncle Sam’s cyber risk | CSO Online
- Starting and Stopping Azure Virtual Machines Using Azure PowerShell
- vCenter Service Appliance 6.7 Tips and Tricks | Virten.net
- Berkshire Hathaway Shareholder Meeting Full Videos, Transcripts, and Podcasts — My Money Blog
- About updating inbox PowerShell modules | >_
- Spectre-NG: Security bods uncover eight new 'Spectre-class' flaws in Intel CPUs
- Yale Scientists Found 'Time Crystal' In The Unlikeliest Place
- US elevates the role of Cyber Command
- Chinese spies linked to decade-long hacking campaign
- Solved: DNS Forwarding 100K+ Entries - Ubiquiti Networks Community
- Should a SaaS provider open source its primary platform? | Opensource.com
- NHS will upgrade all systems to Windows 10 following WannaCry outbreak
- Rob Shaw, Deputy Chief Executive
- Welcome to brigade’s documentation! — brigade 0.0.1 documentation
- Dell Technologies World 2018 – storage.12 – XtremIO X2: An Architectural Deep Dive Notes | penguinpunk.net
- StarEast, InteropITX and GDPR - DBA Kevlar
- Deploy a Cloudera cluster with Terraform and Ansible in Azure - part 2 - Blog dbi services
- SQL Server Security: Are your databases ready for the GDPR? - Blog dbi services
- On the Myth of the 10X Engineer and the Reality of the Distinguished Engineer – Charting Stacks
- Cloud Not Just Someone Else's Computer · Lindsay Hill
- Testing VSAN 6.7 network outages on Ravello is easy! – vMusketeers
- To Be a 10x Engineer, or Not to Be - IOD: [tech.content]
- 10X Engineers - Quora
- Dell Technologies World 2018 – Dell EMC Announces PowerMax | penguinpunk.net
- What’s The Buzz About StorageOS? | penguinpunk.net
- We Have to Learn How to Manage the Cattle « ipSpace.net by @ioshints
- Qucs project: Quite Universal Circuit Simulator
- Introducing zchunk
- Working around Intel Hardware Flaws | Linux Journal
- This Russian Company Sells Zero-Day Exploits for Hospital Software - Motherboard
- De-Googling my phone · Martin Pitt
- A brief history of bad passwords | Opensource.com
- Open Source Password Management Solutions | Bitwarden
- GitHub - google/gvisor: Container Runtime Sandbox
- May 2018 Issue: Privacy | Linux Journal
- Privacy Is Still Personal | Linux Journal
- Weekend Reading: Qubes | Linux Journal
- The GDPR Takes Open Source to the Next Level | Linux Journal
- Where is serverless computing headed? | Opensource.com
- What is Windows 10 Timeline? How To Use It Like A Pro?
- POWERCFG: How To Check Battery Health Report And Energy Report In Windows Using CMD
- How to Install and Configure Redis on Ubuntu 18.04 and Speed Up WordPress Using Redis Caching | Dotlayer
- A Bash Script to Create a Bootable USB from ISO in Linux
- How to Install BookStack Documentation Wiki on CentOS 7
- Is it Time to Regulate Cyber Conflicts? - Lawfare
- What works best Clean Install or Dirty Upgrade?: VMware ESXi Upgrade on HP ML350e Gen8 – Michelle Laverick…
- DELL N4032 / HP HP ProCurve Switch 2810 / Juniper SRX 300 cheat sheet – Laurent Domb OSS Blog (RHCA, AWS SAA,ITIL, eMBA)
- Qemu now supports the HPPA in softmmu mode! | Virtually Fun
- What's New in vSphere 6.7? Should I Upgrade?
- Managed Services Market Trends to be Aware of in 2018
- How to Create a Business Project When It's Your College Homework
- VCSA 6.5 AD Lookup Issues #DNS #DIG #VMware #vExpert #VCSA #vCenter – vMusketeers
- vSphere 6.7 – Let’s break it down! - VirtuallyInclined.com
- Sysadmin Stories: PowerCLI - Batch migrate VM network adapter
- Incremental vs Differential Backup: Difference Explained
- Technology Short Take 98 - Scott's Weblog - The weblog of an IT pro specializing in cloud computing, open source, networking, and virtualization
- 3 questions about Kata Containers answered | Opensource.com
- Automating Labs…Now With YAML and Multi-Threading! – neckercube.com
- CCNA Training » GRE Tunnel Tutorial
- Things to do after installing Ubuntu 18.04 Bionic Beaver Linux - LinuxConfig.org
- Overview on Android x86 Project & Call to Help – FOSS Post
- A look at Peek screen recorder for GNU/Linux - gHacks Tech News
- Timeshift review - Let's do the time warp again
- Red Hat Launches All-In-One Data Center Storage Solution
- Weekend Reading: Privacy | Linux Journal
- Researchers Spent 10 Years Creating This "Master Key" To Unlock Millions Of Hotel Rooms
- How to randomize DNS resolver selection in Knot Resolver – Ctrl blog
- Zero D’Eh: Canada Takes a Bold Step Towards Offensive Cyber Operations - Lawfare
- The best and worst laptop brands 2018
- StorageNewsletter » Daily Breaking News for the Worldwide IT Storage Industry
- New IRS Data Shows Most IRA Contributions Were Made by Middle-Class Taxpayers - Tax Foundation
- Social media has a censorship problem of its own making
- The perfect is the enemy of the good ~ Get Rich Slowly
- OpenDedup – Opensource Dedupe to Cloud and Local Storage
- Zenko - Scality’s Open Source Multi-Cloud Data Controller
- Non-Malware Attacks: What They Are and How to Protect Against Them?
- Why Hackers Love Healthcare
- Recent BA Ransomware Incidents Serve Up Lessons
- TECH-T08-It's-Time-to-Kill-the-Pentest.pdf
- 5 signs you've been hit with an advanced persistent threat (APT) | CSO Online
- Atlanta's recovery highlights the costly mistake of being unprepared | CSO Online
- Why does your most important database run on Oracle 10.2.0.4?
- Oracle Fusion Middleware Infrastructure 12.2.1.2.0 - Probable Incorrect Firewall Configuration - Blog dbi services
- If You're Not Doing Continuous Asset Management You're Not Doing Security
- NBlog - the NoticeBored blog: NBlog April 24 - privacy policies under GDPR [UPDATED]
- One month out: Top 6 steps for GDPR compliance
- 9 steps to implementing ISO 27001 – IT Governance Blog
- Risk Analysis Requirement Survives ‘Meaningful Use’ Revamp
- GDPR compliance in a nutshell | CSO Online
- All About Versions – Time to Upgrade? | ThatJeffSmith
- How This Artist Finds Abstract Art in Footage of Nuclear Explosions - Motherboard
- How to Use Sensu and RabbitMQ on Ubuntu to Monitor Your WordPress Website | Sitety
- How to Install Log.io Realtime Log Monitoring Tool on Ubuntu 16.04 LTS
- [Howto] Using Ansible to manage RHEL 5 systems – /home/liquidat
- Health care data breaches included in Arizona's new notification law
- MalPipe - Malware/IOC Ingestion And Processing Engine - KitPloit - PenTest Tools for your Security Arsenal ☣
- TR Center - Man in the Arena
- A closer look at the GDPR’s technical requirements – IT Governance Blog
- Reading The F****** Manual: Setting Up VMware PowerCLI 10.x – Michelle Laverick…
- A simple Pivotal Container Service (PKS) deployment - CormacHogan.com
- Cilium 1.0: Bringing the BPF Revolution to Kubernetes Networking and Security — Cilium
- BPF, eBPF, XDP and Bpfilter… What are these things and what do they mean for the enterprise? - Netronome
- Chris's Wiki :: blog/linux/HiDPILinuxHassles
- Cookiescanner - Tool For Check The Cookie Flag In Multiple Sites - KitPloit - PenTest Tools for your Security Arsenal ☣
- 5 steps to an effective ISO 27001 risk assessment – IT Governance Blog
- A catastrophic cyber attack is imminent, says UK government – IT Governance Blog
- Why you shouldn’t ignore the NIS Directive – IT Governance Blog
- Passing the AWS Certified Solutions Architect – Associate Exam 2018 Exam #AWS @acloudguru @AWS @AWS_UKI #vExpert – vMusketeers
- Patching my databases with the April 2018 PSU, BP and RU
- Insider Threat: Putting Theory Into Practice - HealthcareInfoSecurity
- Why is the kernel community replacing iptables with BPF? — Cilium
- Spectre and Meltdown's Critical Impact on Cloud Providers and Customers
- Quick Take-Aways From the RSA Security Conference | CSO Online
- Total Meltdown (not Meltdown!) exploit now available @ AskWoody
- Windows Privilege Escalation - Unquoted Services - The Ethical Hacker Network
- Just solve the problem! ~ Get Rich Slowly
- www.moosecon.com
- Infrastructure Hardening · Veeam Backup & Replication Best Practices
- Tom Sneddon's stuff
- Batch Script Tutorial
- Android-x86 - Porting Android to x86
- GitHub - joaomatosf/jexboss: JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool
- DosTips - The DOS Batch Guide
- Francis Lam's Weapons-Grade Ratatouille | The Splendid Table
- GDPR kills the American internet: Long live the internet!
- VMware Product Interoperability Matrices for VMware vSphere Hypervisor (ESXi) | TinkerTry IT @ Home
- Making Use Of The search Option In resolv.conf
- Aaron Toponce : Use A Good Password Generator
- The Difference Between URLs and URIs
- Giving social networking back to you - The Mastodon Project
- Unable to login because of a ESXi root account lockout - IVOBEERENS.nl
- What to know about Spectre and Meltdown with VMware environments - IVOBEERENS.nl
- Conversation Intelligence Technology for Sales Teams | Gong.io
- GitHub - BloodHoundAD/BloodHound: Six Degrees of Domain Admin
- Scanning and Patch Auditing VMware Using Nessus - Blog | Tenable™
- Security Orchestration and Automation for Security Operations | Rapid7
- GitHub - nccgroup/Scout2: Security auditing tool for AWS environments
- Open Source Management and Monitoring System for Ceph | openATTIC
- Index of /
- Including OWASP ModSecurity Core Rule Set – Welcome to netnea
- The Working Centre
- Introducing Mastermind: Powerful and Simple Deployment, Scaling, Load Balancing and Testing of Applications in the Cloud – Microsoft Faculty Connection
- OH2BNF's Plan for a Large Scale Raspberry SDR (LSR-SDR) Based on RTL-SDR Dongles - rtl-sdr.com
- Life On Contract: Lowering Your Cost without Dropping Your Price | Hackaday
- 5 Things You Have to Know About the Dangers of Ransomware
- The 3 Best Ways to Scan Your Old Photos (And Why You Should)
- Learn About Cybersecurity with These 11 Essential Videos
- 7 Types of Ransomware That Will Take You by Surprise
- When Hackerspace Directors Burn Out | Hackaday
- GDPR Data Discovery On Tap from Raz-Lee - IT Jungle
- A lesson in wireless engineering from the Raspberry Pi
- Security Patches: Move Faster to Keep Up With the Bad Guys - Security Boulevard
- 2018 Phishing Trends & Intelligence Report: The Shift to Enterprise - Security Boulevard
- 20 Critical Security Controls: Control 7 – Email and Web Browser Protections - Security Boulevard
- What is cross-site scripting (XSS)? Low-hanging fruit for both attackers and defenders | CSO Online
- Using Rubber Ducky To Steal Encrypted Data | CQURE Academy
- Ransomware (with Allan Liska & Tim Gallo) - Advanced Persistent Security
- NSA reveals how it beats 0-days – Naked Security
- 20 Critical Security Controls: Control 6 – Maintenance, Monitoring, and Analysis of Audit Logs - Security Boulevard
- OWASP APPSEC Cali 2018, Anthony Trummer's 'European Vacation: Leveraging GDPR For Security' - Security Boulevard
- Technology for GDPR Compliance: Turning Plans into Action - Security Boulevard
- Why Cyber-Security Is Critical to The Loyalty of Your Most Valued Customers - Security Boulevard
- What Harm Can Come From Missing 59,000 Vulnerabilities?
- Doing OSINT and Twitter Analytics with Tinfoleak - Koen Van Impe - vanimpe.eu
- SMBrute - SMB Protocol Bruteforce - KitPloit - PenTest Tools for your Security Arsenal ☣
- RTA (Red Team Arsenal) - An Intelligent Scanner To Detect Security Vulnerabilities In Companies Layer 7 Assets - KitPloit - PenTest Tools for your Security Arsenal ☣
- How to write a GDPR-compliant personal data breach notification procedure – IT Governance Blog
- Keep your professional services firm’s papers under wraps for GDPR compliance – IT Governance Blog
- MPs agree there is a “long way to go” to bring cyber security up to standard in the NHS – IT Governance Blog
- FDA Proposes Action to Enhance Medical Device Cybersecurity
- CYMSAB
- Countdown to GDPR: Part 2 — Opportunities and challenges
- How To Start Taking Control Of Your Data - Essential Privacy Tools
- A brief guide to cyber security risk assessments – IT Governance Blog
- GRC Evolves Into Integrated Risk Management - HealthcareInfoSecurity
- Abbott Issues Software Patches for More Cardiac Devices
- What Came First: VLANs or VRFs? « ipSpace.net by @ioshints
- Chris's Wiki :: blog/solaris/ZFSWhyIOInRecordsize
- UUID of hard disk | SvennD
- Installing and Configuring Windows Server Update Services with Windows Server 2016 Core – Stick To The Script
- Self-hosted videos with HLS | Vincent Bernat
- GDPR Scope Queries for Oracle E-Business Suite | Integrigy
- How to recycle your used and unwanted gadgets
- FDA Proposes Action to Enhance Medical Device Cybersecurity
- This Japanese Budgeting System Could Be the Key to Saving Big Bucks
- kakeibo
- How to be happy and lead a meaningful life ~ Get Rich Slowly
- How will the GDPR impact open source communities? | Opensource.com
- Backup And Restore Application Settings On Newly Installed Linux System - OSTechNix
- Failure to automate: 3 ways it costs you | The Enterprisers Project
- Richard Stallman, RMS, on Privacy, Data, and Free Software
- Privacy as an Afterthought: ICANN's Response to the GDPR | Electronic Frontier Foundation
- Create Dynamic Wallpaper with a Bash Script | Linux Journal
- Life After WannaCry's Wake-Up Call: What's Next?
- Health Data Breach Tally Spikes in Recent Weeks
- The Agony and the Ecstasy of Cloud Billing | Linux Journal
- Running Jenkins builds in containers | Opensource.com
- The IoT Hacker's Toolkit · System Overlord
- How to build confidence (and destroy fear)
- Firewall Management Software | Network Security Monitoring
- Application Risk Module - Kenna Security
- Zero Trust Security Model | Alexander's Blog
- GDPR and client-side tools
- Tips and Tricks for Detecting Insider Threats
- Tinfoleak v2.4 - The Most Complete Open-Source Tool For Twitter Intelligence Analysis - KitPloit - PenTest Tools for your Security Arsenal ☣
- Healthcare Exchange Standards: IHE Perspective on EU GDPR
- PowerShell Script to Monitor Active Directory Health | Alexander's Blog
- Mesos and Marathon REST API via cURL - A Hello World Example
- Testing the Hetzner Cloud API via cURL - IaaS Automation -
- DICOM Library - Anonymize, Share, View DICOM files ONLINE
- DICOM Library - Anonymize, Share, View DICOM files ONLINE
- IT Automation Part III: Saltstack "Hello World" Example -
- IT Automation Part II: Ansible "Hello World" for Templating -
- IT Automation Part I: Ansible "Hello World" Example using Ansible on Docker -
- GitHub - ubeeri/Invoke-UserSimulator: Simulates common user behaviour on local and remote Windows hosts.
- Finding purpose: 12 exercises to help you discover purpose and passion
- ICND1 & ICND2 » ICND1 – VLAN Questions
- ICND1 & ICND2 » ICND2 – OSPF Questions 4
- ICND1 & ICND2 » ICND2 – OSPF Questions 3
- ICND1 & ICND2 » ICND2 – OSPF Questions 2
- ICND1 & ICND2 » ICND2 – OSPF Questions
- Cisco and System Security Basics: Learning By Doing: Challenges
- ICND1 & ICND2 » ICND2 – InterVLAN Questions
- ICND1 & ICND2 » ICND2 – RSTP Questions 2
- ICND1 & ICND2 » ICND2 – STP Questions 2
- ICND1 & ICND2 » ICND2 – STP Questions
- Cisco and System Security Basics: CDP: Building Topology Diagram
- Cisco and System Security Basics: Cheap Hacker's Lab
- Cisco and System Security Basics: Passive Reconnaissance - Flowers in Corp Web Page
- Order of Precedence when Configuring ASP.NET Core – Premier Developer
- Cisco and System Security Basics: Cisco: Beginner Level
- Cyber Defense | PowerShell Script to Block Cortana for Privacy | SANS Institute
- Weekly Cyber Risk Roundup: Orbitz Breach, Facebook Privacy Fallout - Security Boulevard
- 6 practices for super smooth Ansible experience by Maxim Chernyak
- Vagrant - Complex Vagrantfile Configurations - EverythingShouldBeVirtual
- The Anatomy of an Instant Clone - VMware Blogs
- Getting Started With Vagrant
- Configuration - VirtualBox Provider - Vagrant by HashiCorp
- Migration and Disaster Recovery in the Oracle Cloud with Rackware | Oracle Cloud Infrastructure Blog
- How to Disable, Uninstall or Reinstall OneDrive in Windows 10
- Tap Drill Sizes
- Protecting routers and other network equipment
- GDPR 'Murica! - DBA Kevlar
- Linux 101 for SQL Server DBAs, Part II - DBA Kevlar
- SQL Server Operations Studio - DBA Kevlar
- GDPR Solutions in the Day of Automation - DBA Kevlar
- Hadoop Architecture | HDFS Architecture | HDFS Tutorial | Hadoop Tutorial – DBA Tutorials
- ISO/IEC 27001 and Why It Matters for Your Business
- When Your Greatest Cybersecurity Doubters Are in the C-Suite - Security Boulevard
- 20 Critical Security Controls: Control 10 - Data Recovery Capabilities
- A week in security (April 02 – April 08) - Security Boulevard
- The Future of GPOs - JumpCloud
- MY TAKE: A breakdown of why Spectre, Meltdown signal a coming wave of ‘microcode’ attacks - Security Boulevard
- What do you wish osquery could do? - Security Boulevard
- OPM provides guidance to address cybersecurity skills gap - Security Boulevard
- Netsparker Surveys US Based C-Levels on GDPR Compliance - Security Boulevard
- Efficiently Testing Pipelined Microservices - Security Boulevard
- Infrastructure-as-Code: Project Update - Virtual Elephant
- Oracle Instance – Prakash Blog
- GROW THAT DBA CAREER – Prakash Blog
- Infrastructure-as-Code: Project Overview - Virtual Elephant
- Infrastructure-as-Code: Bootstrap CoreOS with Ignition - Virtual Elephant
- Infrastructure-as-Code: Understanding CoreOS Ignition - Virtual Elephant
- Infrastructure-as-Code: Getting started with Ansible - Virtual Elephant
- Infrastructure-as-Code: Ansible for VMware NSX - Virtual Elephant
- VCDX Quick Hit - Monitoring and Alerting - Virtual Elephant
- Docker for Ansible + VMware NSX Automation - Virtual Elephant
- Enhanced NSX Modules for Ansible - Virtual Elephant
- oVirt hosted engine with zfs storage - My Wired House
- Manage SCCM configuration items and baselines with community tools – 4sysops
- Tailing the Alert Log with SQLcl | ThatJeffSmith
- A Place to Learn Oracle, No Setup Required | ThatJeffSmith
- UK GCHQ director confirmed major cyberattack on Islamic StateSecurity Affairs
- JeremyFleming
- “Need to Know” for Oracle DBA Begineers – Prakash Blog
- The DBA works at the intersection of the database, server, operations group, and developers. A DBA must understand concepts from all these facets of IT as well as be able to draw upon knowledge of their production environment to troubleshoot performance, hardware, and software issues.
- RAC Notes Scanned Documents – Prakash Blog
- Database Authentication with a Smart Card – Part 3 | Late Night Oracle Blog
- Deploy a Cloudera cluster with Terraform and Ansible in Azure - part 1 - Blog dbi services
- Oracle Backup and Recovery Solutions – Prakash Blog
- SOLVED: Application Data.. repeating recursion | Wordlinks' Blog
- Disable or Uninstall OneDrive Completely in Windows 10 - Tech Journey
- 20 Ways to Increase the Efficiency of the Incident ...
- As Businesses Rush to Comply with GDPR, Some Face Costs of over $1 Million - Security Boulevard
- Tenable Research Advisory: AXIS Camera App Malicious Package Distribution Weakness - Blog | Tenable™
- Zuckerberg Unveils the Cyber-Naivete of Congress - Security Boulevard
- Best Buy the Latest Victim of Third-Party Security ...
- A Nonverbal Analysis of Mark Zuckerberg’s Congress Testimony - Social-Engineer.Com - Professional Social Engineering Training and Services
- Are your Android devices updated? Researchers say maybe noSecurity Affairs
- Security Affairs newsletter Round 157 – News of the weekSecurity Affairs
- The Real Industry Behind Fake Electronics - Motherboard
- Vigilante hackers strike Russia and Iran Networks exploiting Cisco CVE-2018-0171 flawSecurity Affairs
- Pairing Policy & Technology: BYOD That Works for ...
- Slideshows - Dark Reading
- Avoiding the Ransomware Mistakes that Crippled ...
- 7 Steps to a Smooth, Secure Cloud Transition
- 7 Non-Financial Data Types to Secure
- Businesses Calculate Cost of GDPR as Deadline Looms
- Video: MDT 2013 log files basics (bdd.log and smsts.log) | Keith's Consulting Blog
- Basic Usage - Provisioning - Vagrant by HashiCorp
- GitHub - Or3stis/apparatus: A graphical security analysis tool for IoT networks
- ASTo - An IoT Network Security Analysis Tool and Visualizer - KitPloit - PenTest Tools for your Security Arsenal ☣
- APNIC Labs enters into a Research Agreement with Cloudflare | blabs.apnic.net
- The Art of Soldering - Motherboard
- Atlanta, Colorado DOT ransomware mitigation costing millions
- Journey Into Incident Response: Process Hollowing Meets Cuckoo Sandbox
- Journey Into Incident Response: Making Incident Response a Security Program Enabler
- Journey Into Incident Response: Introducing the Active Threat Search
- Journey Into Incident Response: Security Monitoring with Attack Behavior Based Signatures
- Journey Into Incident Response: Triage Practical Solution – Malware Event – Proxy Logs Prefetch $MFT IDS
- GitHub - infobyte/faraday: Collaborative Penetration Test and Vulnerability Management Platform
- How GDPR could impact US health care providers
- Security baselines should underpin efforts to manage cybersecurity risk across sectors – Microsoft Secure
- Building a Successful Security Operations Center (SOC): Part 4Rafeeq Rehman – Personal Blog
- Vulnerability Assessment | Detect Vulnerabilities in Binaries via Hash Lookup
- Microsoft to deliver new products and strategies for security innovation at 2018 RSA Conference – Microsoft Secure
- Why the cyber security skills gap is so damaging – IT Governance Blog
- How are the C-Suite failing cyber security? – IT Governance Blog
- 10 key areas to identify gaps in your GDPR compliance – IT Governance Blog
- Why ISO 27001 is integral to data protection compliance – IT Governance Blog
- The GDPR: What technical measures do you need to conduct? – IT Governance Blog
- Healthcare Exchange Standards: IHE on FHIR tutorial
- Healthcare Exchange Standards: De-Duplicating the received duplicate data
- 2018 Data Breach Investigations Report | Verizon Enterprise Solutions
- 2018-02.pdf
- GitHub - XalfiE/Nix-Auditor: Nix Audit made easier (RHEL, CentOS)
- The Impact of All 50 States Having Breach Notification Laws
- Trusted insider at the federal level raises concerns | CSO Online
- Imran Awan
- Facebook's Zuckerberg Pledges Worldwide GDPR Compliance
- Sep 2011 - C_inaday-NL-ISACA-Erik-van-Eeeden-Cobit.pdf
- WSUS Automated Maintenance (Formerly Adamj Clean-WSUS) - Script Center - Spiceworks
- The CISO as an Internal Security Evangelist - HealthcareInfoSecurity
- How to setup SOC using open-source tools – Sath
- Healthcare Data Management | Commvault
- VMware Storage IO Control (SIOC) Overview
- Open Security Operations Center
- On Old Configs and Automation | The Networking Nerd
- Mind Map for CCIE & CCNP Routing & Switching – neckercube.com
- Mellanox, Ixia and Cumulus: Part 3 - MovingPackets.net
- Mellanox, Ixia and Cumulus: Part 2 - MovingPackets.net
- Mellanox, Ixia and Cumulus: Part 1 - MovingPackets.net
- Container Security through Segregation « ipSpace.net by @ioshints
- The Death Of Expertise
- Security baseline for Windows 10 (v1511, "Threshold 2") — FINAL – Microsoft Security Guidance blog
- Article: Using Secedit To Apply Security Templates | ITNinja
- Infront Consulting Group - Microsoft IT solutions and software
- Business Intelligence and Big Data Analytics Softwa
- high performance WAF platform with Naxsi and HAProxy - HAProxy Technologies
- Configuring Apache in front of JBoss Application Server Using mod_jk
- The answers to your questions for Eben Upton - Raspberry Pi
- Explaining and Demonstrating Jam and Replay Attacks on Keyless Entry Systems with RTL-SDR, RPiTX and a Yardstick One - rtl-sdr.com
- How to clean a circuit board - The Silicon Underground
- Kubernetes 1.10 Released - via @codeship | via @codeship
- Looking inside a .NET core process using windbg – Rohith's blog
- Compare two text files with PowerShell – neo
- Ramping up on Powershell & CLI – Premier Developer
- The Japanese Calendar’s Y2K Moment – I'm not a Klingon ( )
- Cooking for Beginners: 5 Essential Sites for Newbies in the Kitchen
- DSHR's Blog: Natural Redundancy
- The Raspberry Pi 3B+ As An SDR – Without The SDR! | Hackaday
- A comprehensive guide to Docker Networking – Marksei
- The Bootup Baseline (by Tony Fortunato)
- Deployment Research > Research
- Lawmakers want more tech companies to address privacy legislation
- Katello: Create a Domain, Subnet, Installation Media, OS, Provisioning Templates, Host Groups, PXE Boot | Lisenet.com :: Linux | Security | Networking
- 50 State Infographic: How Much Income Do You Need to Afford the Average Home? — My Money Blog
- Automating 4,000 Microsoft SQL Databases with Rubrik, REST APIs, and PowerShell – Virtually Sober
- AWS Online Tech Talks – April & Early May 2018 | AWS News Blog
- How to create vSphere VMs with RDM disks
- Tackling L33t-Speak | Linux Journal
- Agedu - A Useful Tool for Tracking Down Wasted Disk Space in Linux
- Simple Cloud Hardening | Linux Journal
- Blockchain, Part I: Introduction and Cryptocurrency | Linux Journal
- Weekend Reading: Sysadmin 101 | Linux Journal
- 20 Outstanding Backup Utilities for Linux Systems in 2018
- How Wizards and Muggles Break Free from the Matrix | Linux Journal
- Install an OpenStack cloud with Jenkins | Opensource.com
- Laverna - keep your notes private
- Capsule8 - Zero-day attack detection for modern Linux environments
- How to Boot Debian 9 ISO File Directly From Hard Drive With GRUB2
- 42 Books That Will Make You A Better Person (Each Described In 1 Sentence) | RyanHoliday.net
- A Google Cloud Platform Primer with Security Fundamentals
- 6 Steps for GDPR Readiness
- 20 Critical Security Controls: Control 16 - Account Monitoring and Control
- What is Virtual Hardening for Websites? Read all about it.
- 20 Critical Security Controls: Control 17 – Implement a Security Awareness and Training Program - Security Boulevard
- Improved Cybersecurity Measures for Better Organizations | Netswitch Technology ManagementNetswitch Technology Management
- Web Application Firewalls: The Definitive Primer - Security Boulevard
- 10 Best Practices for Mobile App Penetration Testing
- 20 Critical Security Controls: Control 15 - Wireless Access Control
- Establishing a Global Security Operations Center (GSOC) - Security Boulevard
- GDPR Countdown Checklist: 3 Strategic To-Do’s for Cybersecurity Teams - Security Boulevard
- Why Enterprises Should Control Their Encryption Keys - Security Boulevard
- It’s Complicated - Operational Security for Developers - Security Boulevard
- Burp Suite continuing the Saga - Security Boulevard
- SamSam Ransomware: How to Identify and Mitigate the Risk - Security Boulevard
- Real-Time Analytics for PCI Compliance - Security Boulevard
- Annual Report Shows Increased Maturity in Security Operations - Security Boulevard
- SAP HANA Pentesting. Part 1: Vulnerabilities history
- SecurityEverAfter 2018-03-29 21:17:00 - Security Boulevard
- 3 Payloads in Healthcare Data Breaches - Security Boulevard
- 20 Critical Security Controls: Control 12 - Boundary Defense
- OWASP APPSEC Cali 2018, Josh Sokol's 'Architecting for Security in the Cloud' - Security Boulevard
- Intelligent SOC Series: The Role of Your SOC in Managing Digital Risk - Security Boulevard
- RAVELLO: Troubleshooting VSAN Network connectivity issues – vMusketeers
- VMware Specialist: vSAN – Objective 2.2 – Describe vSAN Requirements - thecloudxpert
- Nexenta Announces NexentaCloud | penguinpunk.net
- DBeaver is an SQL client and a database administration tool - Free Alternative to SQL Server Management Studio | ESX Virtualization
- White-Label Backup Solution as a part of MSP Offering
- Amazon S3 Storage Classes Explained
- Managed Service Provider Pricing: Basic Guide on MSP Pricing Models
- Best Backup Software in 2018 | G2 Crowd
- What is SAP S/4HANA? – Business Introduction
- SAP S/4HANA
- The Many Hats Club: Color Doesn't Matter
- 20 Critical Security Controls: Control 11 - Secure Configuration for Network Devices
- Physician, protect thyself: An ounce of prevention is worth a pound of cure - Security Boulevard
- Nine Selves and the Hero’s Journey – Michael O. Church
- How to improve your code using SonarQube
- DSHR's Blog: Flash vs. Disk (Again)
- Tofugu — A Japanese Culture & Language Blog
- How Long Does It Take To Recover From vSAN Drive or Node Failures? — ThinkCharles.net
- Metrics, Measurement, and Information Security -
- SamSam Ransomware: How to Identify and Mitigate the Risk - Blog | Tenable™
- How to prepare for a security audit | Trail of Bits Blog
- GRUB Recovery for UEFI/GPT/LUKS/LVM · The Hacking Memento
- GoScanSSH Malware spread avoiding Government and Military networksSecurity Affairs
- IPFS is the Distributed Web
- Securing the Corporate WLAN in a Healthcare Regulated Organization - securing-corporate-wlan-healthcare-regulated-organization-38370
- Top 6 steps for GDPR compliance
- InfoSec Handlers Diary Blog - How are Your Vulnerabilities?
- NBlog - the NoticeBored blog: NBlog April 4 - 7 top tips on documentation
- Announcing: new British Standard for cyber risk and resilience – Microsoft Secure
- MalwareJake: Atlanta government was compromised in April 2017 - well before last week's ransomware attack
- 7 common flaws that keep security managers up at night
- 7 points CEOs need to know about Spectre and Meltdown
- Envizon - Network Visualization Tool With Focus On Red / Blue Team Requirements - KitPloit - PenTest Tools for your Security Arsenal ☣
- Pyfiscan - Web-Application Vulnerability And Version Scanner - KitPloit - PenTest Tools for your Security Arsenal ☣
- Moloch - An Open Source, Large Scale, Full Packet Capturing, Indexing, And Database System - KitPloit - PenTest Tools for your Security Arsenal ☣
- GRR Rapid Response - Remote Live Forensics For Incident Response - KitPloit - PenTest Tools for your Security Arsenal ☣
- Security Onion - Linux Distro For IDS, NSM, And Log Management - KitPloit - PenTest Tools for your Security Arsenal ☣
- The GDPR: A guide for small businesses – IT Governance Blog
- 15% of computers still run on Windows XP at NHS Lothian in Scotland – IT Governance Blog
- Employees’ lack of security awareness is “inexplicable and inexcusable” – IT Governance Blog
- Simplify your risk assessments – IT Governance Blog
- How to write an ISO 22301-compliant business continuity plan – with example template – IT Governance Blog
- Data Security and Protection (DSP) Toolkit launched for health and social care – IT Governance Blog
- GDPR compliance for professional services firms: time to get on track – IT Governance Blog
- 7 principles of the PRINCE2 project management method – IT Governance Blog
- ISO 27001: How to set and document your information security objectives – IT Governance Blog
- Why you should know about SSL certificates: CertDB.com Case
- 10 Alarming Cyber Security Facts that Threaten Your Data [Updated]
- 10+ Critical Corporate Cyber Security Risks – A Data Driven List [Update 2018]
- Why Is Shadow IT So Common in Healthcare? - HealthcareInfoSecurity
- Should HHS Offer Incentives for Cybersecurity Frameworks?
- Full Disk Encryption on Linux – Exotic Security
- Using Piwik Analytics – Exotic Security
- What exactly is encrypted with Android full disk encryption?
- Setting up FreeRADIUS to secure your WiFi – Exotic Security
- KeePassX
- Is patching still the best defence – Exotic Security
- Automatic Updates for Debian – Exotic Security
- Setting up Gogs on Debian Jessie with Apache2 and PostgreSQL – Exotic Security
- Ansible Role Rdiff-Backup Script | World Backup Day | b3n.org
- Fill Your Skills Tank - The IT Hollow
- How to Reset the ESXi Root Password
- Docker for impatient newbies part 1: Getting started – The Buttonfactory
- 20 Ways to Get The Most Out of Your Data Platform - Thomas LaRock
- IP Over InfiniBand and KVM Virtual Machines - Patshead.com Blog
- Lecture Your Sudoers - krypted.com
- Out-Default Considered Harmful! | Keith's Consulting Blog
- How to setup PFSense with the new Secure and Private CloudFlare 1.1.1.1 DNS – jasoncoltrin.com
- Errata Security: WannaCry after one year
- How to Set Up AWS CloudTrail: An Important Step in Account Security - Delta Risk
- Slideshows - Dark Reading
- 3 Security Measures That Can Actually Be Measured
- Medical Device Security Startup Launches
- Four Gas Pipeline Firms Hit in Attack on Their EDI ...
- How Security Can Bridge the Chasm with Development
- How to Build a Cybersecurity Incident Response Plan
- Supply Chain Attacks Could Pose Biggest Threat to ...
- The Definition of Security is “Without Worry"
- DevOps as the Art and Science of Deliberate Practice
- Analysis of the 2018 F5 Threat Intel Report
- 11 ways ransomware is evolving | CSO Online
- What is FedRAMP? How cloud providers can work with the U.S. government | CSO Online
- MITRE ATT&CK
- RSA Conference: CISOs' top 4 cybersecurity priorities | CSO Online
- What is a supply chain attack? Why you should be wary of third-party providers | CSO Online
- Integrating Ansible with Jenkins in a CI/CD process
- SQL Server Always Encrypted Data | CQURE Academy
- GDPR: end user data loss prevention | CSO Online
- An excellent demonstration of Cross-Site Request Forgery – Exotic Security
- Alternative Networks for this site - ZeroNet – Exotic Security
- Alternative Networks for this site - Tor – Exotic Security
- Alternative Networks for this site - I2P – Exotic Security
- Kerckhoffs's principle – Exotic Security
- Setting up mailpile on Debian 8 Jessie for remote access – Exotic Security
- Adding subject alternative name to certificate request – Exotic Security
- Riot – Riot – open team collaboration
- Home | Matrix.org
- Seting up Matrix Synapse and Riot on Debian 8 Jessie – Exotic Security
- Using ssh config to save settings and make your life easier – Exotic Security
- Chris's Wiki :: blog/sysadmin/BackupCompressionNumbers
- Storing passwords in cleartext: don't ever
- Newsboat - An RSS/Atom Feed Reader for Linux Terminals
- 12 Git tips for Git's 12th birthday | Opensource.com
- ASD's Essential Eight – Exotic Security
- How I Manage Successful Customer 360 Projects
- Upgrading a Nexus 6P from CyanogenMod 13 to LineageOS 14 – Exotic Security
- Automating Oracle Linux Installation with Kickstart - Blog dbi services
- Working with Windows File and Folder NTFS Permissions (Copy and Reset) – A Windows System Admin's Blog
- Best Free Web Application Firewalls - Add an External Security Layer - LinuxLinks
- IP Addresses in Entertainment | The Networking Nerd
- Akash Network
- Overclock Labs | Distributed Infrastructure, Simplified
- 10 Killer Tips To Speed Up Ubuntu Linux
- How to Install Ansible AWX on CentOS 7
- Is Cybersecurity Improving? - Lawfare
- Is It Legal to Publish Email Correspondence Without Permission? - Law and Daily Life
- Foolish money mistakes (and how to avoid them) ~ Get Rich Slowly
- 2 Simple Principles to Make Your Business Relationships More Profitable
- GitHub - gerbera/gerbera: UPnP Media Server for 2018 (Based on MediaTomb)
- FDA wants Facebook and Twitter to crack down on opioid sales
- 6 myths CEOs believe about security | CSO Online
- SamSam group deletes Atlanta's contact portal after the address goes public | CSO Online
- How to configure multiple websites with Apache web server | Opensource.com
- Jaffar's (Mr RAC) Oracle blog: Backup2Cloud - a backup/restore automation utility
- How reimaging detects the ODA hardware? - Blog dbi services
- 12 Best Operating Systems For Ethical Hacking And Penetration Testing | 2018 Edition
- Install SquidGuard with Squid proxy server : Complete guide - LinuxTechLab
- How to Benchmark Your System (CPU, File IO, MySQL) with Sysbench
- FOSS Project Spotlight: CloudMapper, an AWS Visualization Tool | Linux Journal
- Apple now lets you access medical records in Health app
- A simple (but effective) investment strategy ~ Get Rich Slowly
- Dinnertime: Which Meals Offers The Most Nutrition Per Dollar? — My Money Blog
- Epic Fail: Microsoft's Windows 7 Meltdown Fix Made Your PC More Insecure
- How to programmatically set-up a (HTTP) proxy for a Selenium test | Adventures in the programming jungle
- The hidden (and not so hidden) costs of a ransomware attack | CSO Online
- Setting Up Full Disk Encryption on Debian 9 Stretch – Exotic Security
- Installing OpenCanary on a Raspberry Pi – Exotic Security
- Upgrading vSphere 5.5 before End of General Support – The Wifi-Cable
- Benefits of Cloud Storage: Cloud Backup Cost, Data Availability and More
- Happy 25th birthday Red Hat Linux! | ZDNet
- 9 Ways to Vet Your New Employer
- BranchScope: Your Intel CPUs Are Vulnerable To New Spectre-Like Attack
- Manage your workstation with Ansible: Automating configuration | Opensource.com
- How to create an open source stack using EFK | Opensource.com
- Elasticsearch, Fluentd, and Kibana (EFK)
- Get money: Live the life you want, not just the life you can afford
- Attending AWSome Day #AWSomeDay #AWS @AWS_UKI @AWScloud – vMusketeers
- Teaching ‘Cybersecurity Law and Policy’ - Lawfare
- IETF Approves TLS 1.3 as Internet Standard
- Dunning-Kruger in IT Infrastructure « ipSpace.net by @ioshints
- 5 Minute FOSS: Spinning a custom Linux distribution | Linux Journal
- Reuse before buy before build – Exotic Security
- OWASP OWTF
- "WannaCry" ransomware attack losses could reach $4 billion - CBS News
- Setting up Backblaze for Duplicati – Exotic Security
- Hang Gliding Over Hell, 3 drives die in a 6 drive NAS – Exotic Security
- Jaffar's (Mr RAC) Oracle blog: Oracle Cloud - Database Services
- Jaffar's (Mr RAC) Oracle blog: Tricky Oracle data guard situation
- Jaffar's (Mr RAC) Oracle blog: Benefits from Oracle Backup to could service
- IT Value: Using the Web to Divide Your Organizations for Effective Resource Management | CIO
- A Breakdown of Utility Computing | CIO
- Ransomware Damage Costs $5 Billion in 2017, Up from $350 Million in 2015Cybersecurity Ventures
- General Data Protection Regulation
- GitHub - redhat-performance/quads: Automated future scheduling, documentation, end-to-end provisioning and assignment of servers and networks.
- BSI Kitemark | BSI Group
- FY17 NDAA Bill Summary.pdf
- Cybersecurity experts: Device makers have “duty to keep users safe” from hacking | Imperial News | Imperial College London
- BeyondCorp A New Approach to Enterprise Security
- Hippocratic Oath for Connected Medical Devices | i am the cavalry
- Draft NISTIR 8200, Interagency Report on Status of International Cybersecurity Standardization for the Internet of Things (IoT) - nistir8200-draft.pdf
- Tech Networking in Asheville NC and Western North Carolina
- GitHub - R0GGER/docker-wsusoffline: Using a Docker container for WSUS Offline Update...
- Leader in Third-Party Remote Access | Third-Party Remote Support | SecureLink
- BeyondCorp | Run Zero Trust Security Like Google
- Database Authentication with a Smart Card – Part 1 | Late Night Oracle Blog
- FOSSA - Effortlessly comply with open source licenses
- Linux mkfifo Command Tutorial for Beginners (with Examples)
- ddgr - A Command Line Tool To Search DuckDuckGo From The Terminal | 2daygeek.com
- ddgr
- Digitizing VHS with Fedora | Opensource.com
- 8 Ways to Maintain a Clean, Lean Ubuntu Machine - Make Tech Easier
- Huawei – Probably Not What You Expected | penguinpunk.net
- Atlanta officials still 'working around the clock' to resolve ransomware attack | CSO Online
- Shenzhen's Homegrown Cyborg - Motherboard
- GitHub - cldrn/rainmap-lite: Rainmap Lite - Responsive web based interface that allows users to launch Nmap scans from their mobiles/tablets/web browsers!
- Windows Server release information | Microsoft Docs
- Windows Client and Server in 2018 – Stick To The Script
- Every Business Needs to Prioritize Security - common denial
- Defining Computer Security Incident Response Teams | US-CERT
- CERTs, CSIRTs and SOCs after 10 years from definitions - Security Boulevard
- 4 Tips for Managing an Employee with Addiction
- My life philosophy: 49 things I've learned during 49 years on Earth
- Teamwork: Embracing new culture of work – The Art of Possible
- Going paperless with Tesseract OCR
- Hackaday Visits World’s Oldest Computer Festival: TCF 43 | Hackaday
- How to download files with Powershell - Thomas Maurer
- TCF
- Tracking ransomware end-to-end | the morning paper
- How to Save on Storage cost and security using AWS - ITSMDaily.com
- Infosecurity.US - Web Log - Our Strategy...
- Technological Unemployment: Yes, It’s Our Problem Too – Michael O. Church
- 8 Easy Ways to set your Desktop up for a Distraction-Free Software Demo
- Virtual data protection officer service helps UK businesses with GDPR compliance [Q&A]
- Tackling a Fear Of Public Speaking
- Automating DataDog with Terraform
- Windows Metric Dashboards with InfluxDB and Grafana
- 5 Tips for Writing DSC Resources in PowerShell 5
- Ultimate PowerShell Prompt Customization and Git Setup Guide
- Testing Ansible Roles Against Windows with Test-Kitchen
- Slow Transfer, Packet Losses, Congestion Avoidance, Shaping and Policing (by Phil Storey)
- City of Atlanta paralyzed by a ransomware attack, is it SAMSAM?Security Affairs
- What Does the GDPR Consider to be a Data Breach?
- Computer Forensics: Chain of Custody
- SANNY Malware Delivery Method Updated in Recently Observed Attacks - Security Boulevard
- Beware the fake Facebook sirens that flirt you into sextortion – Naked Security
- ODIN - Tool For Automating Penetration Testing Tasks - KitPloit - PenTest Tools for your Security Arsenal ☣
- PyRexecd - Standalone SSH Server For Windows - KitPloit - PenTest Tools for your Security Arsenal ☣
- Cyber attacks: What to prepare for – IT Governance Blog
- How ITIL can help your cyber security career – IT Governance Blog
- How ISO 27001 and ISO 22301 can help keep your organisation secure – IT Governance Blog
- vSAN Benchmarking on Consumer Grade Kit — ThinkCharles.net
- Removing Inaccessible Objects in vSAN — ThinkCharles.net
- A Look At The Relative Spectre/Meltdown Mitigation Costs On Windows vs. Linux - Phoronix
- Setting up a safe development environment in Linux · gsilvapt dot me
- Healthcare Exchange Standards: Privacy is not dead, but does need reinforcement
- 4 Ways Every Employee Can Play a Role in Their Company’s Security
- Hybrid cloud security: Emerging lessons | The Enterprisers Project
- Create VLAN bridge under Linux (trunk, IEEE 802.1Q) | panticz.de
- A system administrator's guide to getting started with Ansible - FAST!
- Is Patching And Tech Support Bad? A Response | The Networking Nerd
- vMotion with 40GbE NIC – virtual graveyard
- The Linux Journal NSA Weekend Reading List: Tails and Tor | Linux Journal
- Doc Searls Weblog · Facebook’s Cambridge Analytica problems are nothing compared to what’s coming for all of online publishing
- France's Cyberdefense Strategic Review and International Law - Lawfare
- United States Cyber Command’s New Vision: What It Entails and Why It Matters - Lawfare
- Dell EMC and VMware – Better Together for Service Providers - VMware Telco NFV Blog - VMware Blogs
- mastodon.social - Mastodon
- VMware ESXi and ESXTOP "P" Key is New in vSphere 6.5 - Did you know? | ESX Virtualization
- Surviving 63 Drives Failure on vSAN — ThinkCharles.net
- NSX-v 6.3 - Load Balancing capabilities + confi... |VMware Communities
- 25 Low-Cost Foods Packed With Nutrition
- Advice for a young adult learning to manage money ~ Get Rich Slowly
- New R2D2 Technique Protects Files Against Wiper Malware
- An accessible overview of Meltdown and Spectre, Part 2 - Security Boulevard
- Cloud Backup for Small Business: 3 Misconceptions SMBs Have About Cloud
- Study: Malware counts higher on computers whose users visited piracy sites
- Government ‘should have done more’ to prepare organisations for the GDPR – IT Governance Blog
- 80% of organisations affected by cyber security skills gap – IT Governance Blog
- On purpose and by necessity: compliance under the GDPR | the morning paper
- Three years of the Right To Be Forgotten | the morning paper
- 10 Vital Features You Should Know About Your Windows PC
- 10 Basic Encryption Terms Everyone Should Know and Understand
- Lack of investment in security training adds to skills gap
- Google Beefs Up Cloud Security and Data Privacy Tools | News & Opinion | PCMag.com
- White House pushing for research carveout in GDPR
- Why is the CISO Role the Most Difficult Job in the World?Webinar.
- Digital Advertising Consent
- Oath Takes Aggressive Steps Outlining GDPR Compliance 03/22/2018
- Is MLAG an Alternative to Stackable Switches? « ipSpace.net by @ioshints
- Suplemon - A Powerful Console Text Editor with Multi Cursor Support
- Practical Security Principles
- The Reason Software Remains Insecure
- The Two Kinds of Privacy Loss
- Mitigating Personal Cyber Risk | CSO Online
- How Programming Affects Your Brain: 3 Big Truths According to Science
- How to Decide If You Need the New Raspberry Pi 3 B+ Model
- Wireshark, an Open-Source Forensic Tool
- Opening RDP sessions from KeePass
- CRISC Domain 2: IT Risk Assessment
- Why it’s a bad idea to break the rules, even if it’s for a good cause - 80,000 Hours
- Use Ansible to patch your system and install applications | Opensource.com
- A Guide to Preventing Common Security Misconfigurations
- CASP Domain 4: Integration of Computing, Communications, and Business Disciplines
- 8 Podcasts About Crypto for Future Bitcoin Millionaires
- Threat Horizon 2020: Foundations Start To Shake - Information Security Forum
- 10 efficient tools every marketing team needs in 2018
- ToolsWatch.org – The Hackers Arsenal Tools Portal » T.rex_scan v0.2 – Integrate Tools to Audit Web Sites
- Critical Security Controls v7 RELEASED - Security Boulevard
- Yoda - The Command line Personal Assistant For Your Linux System - OSTechNix
- WPSeku v0.4 - Wordpress Security Scanner - KitPloit - PenTest Tools for your Security Arsenal ☣
- Cybersecurity Spring Cleaning: 3 Must-Dos for 2018 ...
- Zerto – What it is and why you need it | JonKensy.com
- Case Study: Scaling Your Data Scientist
- Your servers are replicated? Your backups should be, too » NetWorker Information Hub
- SOC in Translation: 4 Common Phrases & Why They ...
- Western Digital – The A Is For Active, The S Is For Scale | penguinpunk.net
- 7 Types of People Who Will Help Grow Your Career
- Evil Tester: Automated Execution for Acceptance Testing - Java JUnit FizzBuzz
- AMD vows to fix newly-disclosed processor vulnerabilities
- Moro - A Command Line Productivity Tool For Tracking Work Hours - OSTechNix
- 7 Spectre/Meltdown Symptoms That Might Be Under ...
- Codev2:Lawrence Lessig
- (My) OWASP Belgium Chapter meeting notes | Adventures in the programming jungle
- redhat event Ansible Automates Zurich - Blog dbi services
- The Cambridge Analytica-Facebook Debacle: A Legal Primer - Lawfare
- NBlog - the NoticeBored blog: NBlog March 20 - a critique of CIS netsec metrics
- Python BeautifulSoup Tutorial For Beginners | Linux Hint
- Taipan - Web Application Security Scanner - KitPloit - PenTest Tools for your Security Arsenal ☣
- Lessons the world took from ITIL | The IT Skeptic
- ISO 27001 and the GDPR
- Do IT Pros Consider Security When Purchasing Software? - Security Boulevard
- CIS Releases Revised Top 20 Critical Security Controls
- CUDA is Like Owning a Supercomputer | Hackaday
- A Data Protection Officer's Guide to the GDPR Galaxy
- Insider threat examples: 7 insiders who breached security | CSO Online
- How to Encrypt Files From Within a File Manager | Linux.com | The source for Linux information
- ACUS_Intel_MedicalDevices.pdf
- CSR - ScottErvenMedicalDeviceSecurity.pdf
- Underwriters Labs refuses to share new IoT cybersecurity standard | Ars Technica
- Talks | i am the cavalry
- It's Insanely Easy to Hack Hospital Equipment | WIRED
- SNMP Lab Setup and Penetration Testing
- Errata: Steve Gibson
- Enterprise NAS Data Migration and Replication Solutions | Datadobi
- Vint Cerf and Bob Kahn, co-inventors of TCP/IP protocol | FierceTelecom
- GitHub - vincentcox/StaCoAn: StaCoAn is a crossplatform tool which aids developers, bugbounty hunters and ethical hackers performing static code analysis on mobile applications.
- Network issues with Updates KB4088875 / KB4088878 | Born's Tech and Windows World
- Security-announce Info Page
- OIG: HHS Improves Security, Yet Flaws Remain - HealthcareInfoSecurity
- Weekly Cyber Risk Roundup: Russia Sanctions, Mossack Fonseca Shutdown, Equifax Insider Trading - Security Boulevard
- Chris's Wiki :: blog/solaris/ZFSPoolRecoveryComing
- Oracle Ravello Blogger Day 2018 (aka #RBD2) | Michelle Laverick...
- Seth's Blog: When well-meaning people can't see it the same way
- Magical Thinking in Internet Security
- A Tale of Two Phases and Tech Inertia | Hackaday
- What?s It Take To Be Tomorrow?s CISO? - Security Boulevard
- Top 10 articles every SAP BASIS admin must read
- Steps to Become CISSP (Certified Information Systems Security Professional)
- Cybersecurity Evolution and its Importance in the Digital Age - Security Boulevard
- More Free/Open Source Computer Forensics Tools
- Are You Compliant with NIST 800-171? - Security Boulevard
- 9 Cyber Security Tips SMBs Can Implement Now - Delta Risk
- CASP Domain 3: Research and Analysis
- CASP Domain 2: Risk Management and Incident Response
- CASP Domain 1: Enterprise Security
- Harden your JBoss EAP 7.1 Deployments with the Java Security Manager - Red Hat Customer Portal
- Microsoft Security Intelligence Report volume 23 is now available – Microsoft Secure
- Security: 17 Things | Linux Journal
- 3 best practices for securing Kubernetes environments | Opensource.com
- Getting to know your company’s risk appetite | CSO Online
- The CLOUD Act Doesn’t Help Privacy and Human Rights: It Hurts Them - Lawfare
- GitHub - initstring/linkedin2username: OSINT Tool: Generate username lists for companies on LinkedIn
- GitHub - rezasp/joomscan: OWASP Joomla Vulnerability Scanner Project
- SpiderFoot
- 5 reasons why law firms should adopt ISO 27001 – IT Governance Blog
- Failing to patch vulnerabilities now will lead to punishment under the GDPR – IT Governance Blog
- Get involved in Shaping the Future of the Internet (by Nalini Elkins)
- GDPR Violations Are Hiding In Your Database - Here's How To Find Them - Thomas LaRock
- We Need To Talk About Dashboards - Thomas LaRock
- (ISC)2 Report: Glaring Disparity in Diversity for ...
- Oracle Ravello Blogger Day 2 (#RBD2) – Part 2 – Ather Beg’s Useful Thoughts
- Oracle Ravello Blogger Day 2 (#RBD2) – Part 1 – Ather Beg’s Useful Thoughts
- 3 ESXi Backup Methods using the Command-Line
- FAI.me - build you own customized installation image
- Chris's Wiki :: blog/linux/NfsiotopDesire
- How to take back control of /etc/resolv.conf on Linux – Ctrl blog
- MSRC security guidance: the dashboard | >_
- Oracle Patches Spectre for Red Hat | Linux Journal
- Infection Monkey
- How to Overclock Your AMD GPU with AMDGPU on Linux - Make Tech Easier
- Woke to IT Age Discrimination - The IT Hollow
- Terence Luk: Monitoring Microsoft Exchange Server 2010, 2013 and 2016 services with PowerShell script and task scheduler
- Emerging Technologies and VeriSM | Purple Griffon
- The SQL Server Tiger Team Bookmarks - Thomas LaRock
- Intel Spectre/Meltdown Microcode Updates (March 11, 2018) | Born's Tech and Windows World
- MSRC security guidance: about release notes | >_
- Databases need to be patched to a minimum before April 2019
- GRV - A Tool for Viewing Git Repositories in Linux Terminal
- Oracle Linux vs RedHat | Linux Hint
- Cli.Fyi – A Tool To Quickly Retrieve Useful Information | 2daygeek.com
- HIPAA Guidelines & Cloud Service Providers - Security Boulevard
- XKCD, Generations - Security Boulevard
- An Overview of the CCSP Domains
- The Ultimate Guide to CCSP Certification
- Evolving to Security Decision Support: Laying the Foundation - Security Boulevard
- How to Prepare for the Future of Healthcare Digital Security - Security Boulevard
- March Updates on Frameworks & Standards - Security Boulevard
- The Top Five SOC 2 Compliance Questions Answered - Security Boulevard
- What the Next Era of Cloud Computing Means for AppSec & the SDLC - Security Boulevard
- Virginia Commonwealth University Enrolls WhiteHat Security and its Application Security Platform to be the Foundation of its Application Vulnerability Management Program - Security Boulevard
- Army History, No. 106, Winter 2018 - AH106(W).pdf
- 2018 Cyberthreat Defense Report: Where IT Security Is Going - Security Boulevard
- From my Gartner Blog - The Virtual Patch Analyst - Security Boulevard
- Shifting Gears to Cloud-Centric Cybersecurity - Security Boulevard
- What is a vulnerability management program? - The Silicon Underground
- VMRay Analyzer: Rapid Malware Analysis for Incident Response (IR) Teams - vmray-analyzer-rapid-malware-analysis-incident-response-ir-teams-38325
- Learn More about the 2018 PMP Exam Change | Tech Roots
- Measure Security Performance, Not Policy Compliance - Security Boulevard
- Who Cares About Cybersecurity? - Lawfare
- Comparing Plans | Oracle Scratchpad
- How To Quickly Monitor Multiple Hosts In Linux - OSTechNix
- HIMSS18: Cybersecurity Takeaways - HealthcareInfoSecurity
- GitHub - facebook/zstd: Zstandard - Fast real-time compression algorithm
- UTOUG Training Days 2018 in Salt Lake City
- NextGen SIEM Isn’t SIEM - Security Boulevard
- NBlog - the NoticeBored blog: NBlog March 8 - brainstorming awareness ideas
- What’s new for the Command Line in Windows 10 version 1803 – Windows Command Line Tools For Developers
- CredsLeaker - Tool to Display A Powershell Credentials Box - KitPloit - PenTest Tools for your Security Arsenal ☣
- Ride The Lightning: Large Law Firms Seeing More Data Breaches
- Physical Data Center Security – Make it better
- sub6 - Web App Scanner - KitPloit - PenTest Tools for your Security Arsenal ☣
- The cost of a cyber attack – IT Governance Blog
- Home Depot in $27.84 million California hazardous waste, privacy settlement
- Patching Your Software Alone Is A Hassle. Not Patching Is A Risk
- Your IT shop is Ugly! Part 3 | Virtual Me
- Your IT shop is Ugly! Part 2 | Virtual Me
- Your IT shop is Ugly! Part 1 | Virtual Me
- Updated Oracle Roadmap Points To Post-11.4 Solaris Release Around 2020 - Phoronix
- vSAN Online Health checks: New KBs now available - Virtual Blocks
- vSAN Online Health checks: New KBs now available - Virtual Blocks
- Rubrik Automated IT Helpdesk Ticketing v1 – Virtually Sober
- Intel X710 NICs Are Crap - The Lone Sysadmin
- Essential RHCE/RHCSA Study Guides – Codingbee
- Nobody is an expert at Oracle Database 18c | The ORACLE-BASE Blog
- Get IAM roles,policies and users-AWS CLI | geekdudes
- Make Your Program Slower With Threads - Marc's Blog
- Two traps in iostat: %util and svctm - Marc's Blog
- Beyond iostat: Storage performance analysis with blktrace - Marc's Blog
- Latency lags bandwidth - Marc's Blog
- A layered approach to backups | Scott Gruby's Blog
- PowerCLI - VM and Host Metrics To Elasticsearch - EverythingShouldBeVirtual
- Ansible for Extreme Devices · Lindsay Hill
- Network Janitor | The Smartest Guy in the Room
- How to Setup iSCSI Server (Target) and Client (Initiator) on Debian 9
- Deeper Dive—Are the 3 major DRAM producers gaming the market? | FierceCable
- sigma - Generic Signature Format for SIEM Systems - KitPloit - PenTest Tools for your Security Arsenal ☣
- How to write a GDPR privacy notice – with documentation template example – IT Governance Blog
- Equifax facing historic data breach costs
- GDPR - Three Things You Can Do Now to Prepare
- Link Layer Discovery Protocol (LLDP): How it Works and Configuration
- vRetreat 2018: Zerto Virtual Replication 6.0 – Ather Beg’s Useful Thoughts
- Errata Security: Some notes on memcached DDoS